StegoTorus: a camouflage proxy for the Tor anonymity system

  • Authors:
  • Zachary Weinberg;Jeffrey Wang;Vinod Yegneswaran;Linda Briesemeister;Steven Cheung;Frank Wang;Dan Boneh

  • Affiliations:
  • Carnegie Mellon University, Pittsburgh, PA, USA;Stanford University, Stanford, CA, USA;SRI International, Menlo Park, CA, USA;SRI International, Menlo Park, CA, USA;SRI International, Menlo Park, CA, USA;Stanford University, Stanford, CA, USA;Stanford University, Stanford, CA, USA

  • Venue:
  • Proceedings of the 2012 ACM conference on Computer and communications security
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Internet censorship by governments is an increasingly common practice worldwide. Internet users and censors are locked in an arms race: as users find ways to evade censorship schemes, the censors develop countermeasures for the evasion tactics. One of the most popular and effective circumvention tools, Tor, must regularly adjust its network traffic signature to remain usable. We present StegoTorus, a tool that comprehensively disguises Tor from protocol analysis. To foil analysis of packet contents, Tor's traffic is steganographed to resemble an innocuous cover protocol, such as HTTP. To foil analysis at the transport level, the Tor circuit is distributed over many shorter-lived connections with per-packet characteristics that mimic cover-protocol traffic. Our evaluation demonstrates that StegoTorus improves the resilience of Tor to fingerprinting attacks and delivers usable performance.