"Super nodes" in Tor: existence and security implication

  • Authors:
  • Chenglong Li;Yibo Xue;Yingfei Dong;Dongsheng Wang

  • Affiliations:
  • Tsinghua National Laboratory for Information Science and Technology (TNList) Beijing, China and Tsinghua University, Beijing, China;Tsinghua National Laboratory for Information Science and Technology (TNList), Beijing, China;University of Hawaii, Honolulu, HI;Tsinghua National Laboratory for Information Science and Technology (TNList), Beijing, China

  • Venue:
  • Proceedings of the 27th Annual Computer Security Applications Conference
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Tor (the second generation onion routing) is arguably the most popular low-lateney anonymous communication system now. In this paper, we reexamine the anonymity of Tor based on our observation of "super nodes". These nodes are more available and reliable than other nodes and provide high bandwidth for assisting the system in both performance and stability. We first confirm their existence by analyzing the life cycles of node IP addresses and node bandwidth contributions via two correlation approaches, on a set of self-collected data and a set of real data from the Tor official collection. We then analyze the effect of super nodes on the anonymity of Tor, discuss attacks that exploit such knowledge, and verify our analysis with real data to show potential damages. Furthermore, we investigate new attacks that exploit the knowledge of super nodes. Our simulation results show that these attacks can greatly damage the anonymity of Tor.