Demo: Traffic Splitting for Tor — A Defense against Fingerprinting Attacks

Abstract

Website fingerprinting (WFP) attacks on the anonymity network Tor have become ever more effective. Furthermore, research discovered that proposed defenses are insufficient or cause high overhead. In previous work, we presented a new WFP defense for Tor that incorporates multipath transmissions to repel malicious Tor nodes from conducting WFP attacks. In this demo, we showcase the operation of our traffic splitting defense by visually illustrating the underlying Tor multipath transmission using LED-equipped Raspberry Pis.

Collection
Electronic Communications of the EASST
Publication
Proceedings of the 2021 International Conference on Networked Systems (NetSys '21)
Sebastian Reuter
Sebastian Reuter
Dr. rer. nat. Jan Pennekamp
Dr. rer. nat. Jan Pennekamp
Postdoctoral Researcher
Placeholder Avatar
Andriy Panchenko
Klaus Wehrle
Klaus Wehrle
Head of Group