TY - GEN
T1 - Challenges in protecting tor hidden services from botnet abuse
AU - Hopper, Nicholas
PY - 2014/1/1
Y1 - 2014/1/1
N2 - In August 2013, the Tor network experienced a sudden, drastic reduction in performance due to the Mevade/Sefnit botnet. This botnet ran its command and control server as a Tor hidden service, so that all infected nodes contacted the command and control through Tor. In this paper, we consider several protocol changes to protect Tor against future incidents of this nature, describing the research challenges that must be solved in order to evaluate and deploy each of these methods. In particular, we consider four technical approaches: resource-based throttling, guard node throttling, reuse of failed partial circuits, and hidden service circuit isolation.
AB - In August 2013, the Tor network experienced a sudden, drastic reduction in performance due to the Mevade/Sefnit botnet. This botnet ran its command and control server as a Tor hidden service, so that all infected nodes contacted the command and control through Tor. In this paper, we consider several protocol changes to protect Tor against future incidents of this nature, describing the research challenges that must be solved in order to evaluate and deploy each of these methods. In particular, we consider four technical approaches: resource-based throttling, guard node throttling, reuse of failed partial circuits, and hidden service circuit isolation.
UR - http://www.scopus.com/inward/record.url?scp=84916623770&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84916623770&partnerID=8YFLogxK
U2 - 10.1007/978-3-662-45472-5_21
DO - 10.1007/978-3-662-45472-5_21
M3 - Conference contribution
AN - SCOPUS:84916623770
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 316
EP - 325
BT - Financial Cryptography and Data Security - 18th International Conference, FC 2014, Revised Selected Papers
A2 - Safavi-Naini, Reihaneh
A2 - Christin, Nicolas
PB - Springer- Verlag
T2 - 18th International Conference on Financial Cryptography and Data Security, FC 2014
Y2 - 3 March 2014 through 7 March 2014
ER -