A Tor Anonymity Attack Experiment Platform Driven by Raspberry Pi

Private Tor network is essential for analyzing security issues both for Tor project as well as for numerous researchers. However, current research work mainly focus on improving scalability and efficiency by simulating traffic discretely with single node and restoration level by deploying a complete...

Full description

Saved in:
Bibliographic Details
Published in2020 11th International Conference on Prognostics and System Health Management (PHM-2020 Jinan) pp. 569 - 574
Main Authors Wang, Qi, Cao, Weiquan
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.10.2020
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Private Tor network is essential for analyzing security issues both for Tor project as well as for numerous researchers. However, current research work mainly focus on improving scalability and efficiency by simulating traffic discretely with single node and restoration level by deploying a complete private network with high cost. In this paper, we propose a novel methodology constructing real private tor network by editing and controlling Raspberry Pis, called Tor anonymity attack experiment platform. Compared with other platforms of the same type, the platform has the advantages of low cost, easy to scale, high quality of real-time data transmission, high degree of network protocol restoration as well as convenient configuration. In order to demonstrate the platform can be used as a private and complete Tor anonymous network experiment environment, we conduct a source tracing attack as a study case. Experimental results and theoretical analysis both show that the platform can support researchers to carry out numerous Tor network security research with high degree of restoration efficiently and cheaply.
ISSN:2166-5656
DOI:10.1109/PHM-Jinan48558.2020.00111