new cell counting based attack against tor

Upload: uthrasiva

Post on 03-Jun-2018

224 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    1/62

    CONTENTS1. Synopsis

    2. Introduction

    2.1. Project Description

    2.2. Company Profile

    3. System Analysis

    3.1. Existing System

    3.2. Proposed System

    4. Hardware And Software Specification

    .1. !ard"are Specification

    .2. Soft"are Specification

    .3. #$o%t Soft"are

    5. System Design

    &.1. Data 'lo" Diagram

    &.2. Data$ase Str%ct%re

    &.3. Code Design

    &. . Screen (ayo%t

    6. System esting

    !. System Implementation

    ". #uture en$ancement

    %. &onclusion.

    1'. (i)liograp$y

    1

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    2/62

    S*+,-SIS

    A)stract :

    )ario%s lo"*latency anonymo%s comm%nication systems s%c+ as Tor and

    #nonymi,er +a-e $een designed to pro-ide anonymity ser-ice for %sers. n order to +ide

    t+e comm%nication of %sers/ most of t+e anonymity systems pac0 t+e application data

    into e %al*si,ed cells. )ia extensi-e experiments on Tor/ "e fo%nd t+at t+e si,e of P

    pac0ets in t+e Tor net"or0 can $e -ery dynamic $eca%se a cell is an application concept

    and t+e P layer may repac0 cells. ased on t+is finding/ "e in-estigate a ne" cell*

    co%nting*$ased attac0 against Tor/ "+ic+ allo"s t+e attac0er to confirm anonymo%scomm%nication relations+ip among %sers -ery %ic0ly. n t+is attac0/ $y marginally

    -arying t+e n%m$er of cells in t+e target traffic at t+e malicio%s exit onion ro%ter/ t+e

    attac0er can em$ed a secret signal into t+e -ariation of cell co%nter of t+e target traffic.

    T+e em$edded signal "ill $e carried along "it+ t+e target traffic and arri-e at t+e

    malicio%s entry onion ro%ter. T+en/ an accomplice of t+e attac0er at t+emalicio%s entry

    onion ro%ter "ill detect t+e em$edded signal $ased on t+e recei-ed cells and confirm t+e

    comm%nication relations+ip among %sers. e +a-e implemented t+is attac0 against Tor/

    and o%r experimental data -alidate its feasi$ility and effecti-eness. T+ere are se-eral

    %ni %e feat%res of t+is attac0. 'irst/ t+is attac0 is +ig+ly efficient and can confirm -ery

    s+ort comm%nication sessions "it+ only tens of cells. Second/ t+is attac0 is effecti-e/ and

    its detection rate approac+es 1445 "it+ a -ery lo" false positi-e rate. T+ird/ it is possi$le

    to implement t+e attac0 in a "ay t+at appears to $e -ery diffic%lt for +onest participants

    to detect.

    2

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    3/62

    A &HI /& 0 /

    3

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    4/62

    I+ ,D0& I,+

    &ONCE6NS a$o%t pri-acy and sec%rity +a-e recei-ed greater attention "it+ t+e

    rapid gro"t+ and p%$lic acceptance of t+e nternet/ "+ic+ +as $een %sed to create o%r

    glo$al E*economy. #nonymity +as $ecome a necessary and legitimate aim in manyapplications/ incl%ding anonymo%s e$ $ro"sing/ location*$ased ser-ices/ and E*-oting.

    n t+ese applications/ encryption alone cannot maintain t+e anonymity re %ired $y

    participants. n t+e past/ researc+ers +a-e de-eloped n%mero%s anonymo%s

    comm%nication systems. 7enerally spea0ing/ mix tec+ni %es can $e %sed for eit+er

    message*$ased or flo"*$ased anonymity applications. E*mail is a typical message*$ased

    anonymity application/ "+ic+ +as $een t+oro%g+ly in-estigated. 6esearc+ on flo"*$ased

    anonymity applications +as recently recei-ed great attention in order to preser-e

    anonymity in lo"*latency applications/ incl%ding e$ $ro"sing and peer*to*peer file

    s+aring . To degrade t+e anonymity ser-ice pro-ided $y anonymo%s comm%nication

    systems/ traffic analysis attac0s +a-e $een st%died. Existing traffic analysis attac0s can $e

    categori,ed into t"o gro%ps8 passi-e traffic analysis and acti-e "atermar0ing tec+ni %es.

    Passi-e traffic analysis tec+ni %e "ill record t+e traffic passi-ely and identify t+e

    similarity $et"een t+e sender9s o%t$o%nd traffic and t+e recei-er9s in$o%nd traffic $ased

    on statistical meas%res. eca%se t+is type of attac0 relies on correlating t+e timings of

    messages mo-ing t+ro%g+ t+e anonymo%s system and does not c+ange t+e trafficc+aracteristics/ it is also a passi-e timing attac0. 'or example/ Serjanto- et al. proposed a

    passi-e pac0et*co%nting sc+eme to o$ser-e t+e n%m$er of pac0ets of a connection t+at

    arri-es at a mix node and lea-es a node. !o"e-er/ t+ey did not ela$orate +o" pac0et

    co%nting co%ld $e done. To impro-e t+e acc%racy of attac0s/ t+e acti-e "atermar0ing

    tec+ni %e +as recently recei-ed m%c+ attention. T+e idea of t+is tec+ni %e is

    to acti-ely introd%ce special signals into t+e sender9s o%t$o%nd traffic "it+ t+e intention

    of recogni,ing t+e em$edded signal at t+e recei-er9s in$o%nd traffic .

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    5/62

    - , /& D/S& I- I,+

    ,D0 /S

    1. Data ransmission

    2. &omponents of or

    3. &ells at ,nion outers

    Data ransmission

    n Tor/ an maintains a connection to ot+er on demand. T+e %ses a "ay of so%rce

    ro%ting and c+ooses se-eral from t+e locally cac+ed directory/ do"nloaded from t+e

    directory cac+es. T+e n%m$er of t+e selected is referred as t+e pat+ lengt+. e %se t+edefa%lt pat+ lengt+ of t+ree as an example. T+e iterati-ely esta$lis+es circ%its across t+e

    Tor net"or0 and negotiates a symmetric 0ey "it+ eac+/ one +op at a time/ as "ell as

    +andles t+e streams from client applications. T+e side of t+e circ%it connects to t+e

    re %ested destinations and relays t+e data. e no" ill%strate t+e proced%re t+at t+e

    esta$lis+es a circ%it and do"nloads a file from t+e ser-er.

    &omponents of or

    Onion ro%ters are special proxies t+at relay t+e application data. n Tor/ transport*layer

    sec%rity connections are %sed for t+e o-erlay lin0 encryption $et"een t"o onion ro%ters.

    T+e application data is pac0ed into e %al*si,ed cells. T+ey +old onion ro%ter information

    s%c+ as p%$lic 0eys for onion ro%ters. Directory a%t+orities +old a%t+oritati-e information

    on onion ro%ters/ and directory cac+es do"nload directory information of onion ro%ters

    from a%t+orities.

    &ells at ,nion outers

    To $egin "it+/ t+e onion ro%ter recei-es t+e data from t+e connection on t+e gi-en

    port A. #fter t+e data is processed $y protocols/ t+e data "ill $e deli-ered into t+e $%ffer

    of t+e connection. +en t+ere is pending data in t+e $%ffer/ t+e read e-ent of t+is

    connection "ill $e called to read and process t+e data. T+e connection read e-ent "ill

    p%ll t+e data from t+e $%ffer into t+e connection inp%t $%ffer. Eac+ connection inp%t

    &

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    6/62

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    7/62

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    8/62

    S*S / A+A *SIS

    Introduction

    System #nalysis and Design/ is t+e process of gat+ering and

    interpreting facts/ diagnosing pro$lem and %sing t+e information to recommend

    impro-ement to t+e system. efore de-elopment of any project can $e p%rs%ed/ a

    system st%dy is cond%cted to learn t+e details of t+e c%rrent $%siness sol%tion.

    nformation gat+ered t+ro%g+ t+e st%dy forms t+e $asis for creating alternati-e

    design strategies. )irt%ally all organi,ations are systems t+at interact "it+ t+eiren-ironment t+ro%g+ recei-ing inp%t and prod%cing o%tp%t.

    t is a management tec+ni %e %sed in designing a ne" system/

    impro-ing an existing system or sol-ing pro$lem. System analysis does not

    g%arantee t+at t+e %ser "ill deri-e an ideal sol%tion to a pro$lem. T+is depends

    solely on t+e "ay one design a system to exploit t+e potential in t+e met+od. To

    p%t it in anot+er "ay/ creati-ity is as m%c+ as m%st pre*design t+e st%dy and

    pro$lem sol-ing process and e-al%ate e-ery s%ccessi-e step in t+e system

    analysis.

    Ta0ing all t+ese factors into acco%nt and "it+ t+e 0no"ledge of t+e

    inter*relations+ip $et"een t+e -ario%s fields and section and t+eir potential

    interactions/ t+ey are consider for de-eloping t+e "+ole system in and integrated

    manner/ t+is project is de-eloped to meet all t+e criteria in t+e

    T+e management tec+ni %e is also +elps %s in de-elop and design of

    t+e ne" system or to impro-e t+e existing system.

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    9/62

    T+e follo"ing O$jecti-es are 0ept in mind8

    dentify t+e c%stomer9s need.

    E-al%ate t+e system concept for feasi$ility.

    Perform economic and tec+nical analysis.

    #llocate f%nctions to +ard"are/ soft"are/ people/

    data$ase and ot+er system elements.

    Esta$lis+ cost and sc+ed%le constraints

    Create a system definition t+at forms t+e fo%ndation

    for all s%$se %ent engineering "or0.

    Identification of t$e need

    n t+is/ t+ere are certain expressions t+at are $eing %sed in t+ede-elopment of t+e project. #nd/ it is %sed to identify o%r needs or so%rce in

    t+e project.

    Defining a pro$lem

    'inding t+e -ario%s need for t+e pro$lem

    'ormali,ing t+e need

    6elating t+e need

    T+%s/ it is t+e first step for system de-elopment life cycle.

    =

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    10/62

    1. nitial n-estigation

    t is one "ay of +andling t+e project/ it is %sed to 0no" a$o%t

    t+e %ser re %est and t+e modification of t+e system s+o%ld $e done.

    T+e %ser9s re %est for t+is project is as follo"s8

    1. #ssigning separate "or0 area for different %sers.

    2. Nat%re of t+e "or0

    3. 6eg%lar %pdate and delete of record

    . 6eg%lar calc%lation of Net #sset )al%e

    &. S%pplying t+e data "it+ t+e time re %ired.

    T+e %ser re %est identifies t+e need for c+ange and a%t+ori,es t+e

    initial in-estigation. t may %ndergo se-eral modifications $efore it $ecome

    a "ritten commitment. Once appro-ed t+e acti-ities are carried o%t into

    action. T+e proposal/ "+en appro-ed/ it initiates a detailed %ser*oriented

    specification of system performance and analysis of t+e feasi$ility of t+e

    e-al%ating alternati-e candidate systems "it+ a recommendation of t+e $est

    system for t+e jo$.

    #easi)ility Study

    T+e o$jecti-e of t+e feasi$ility st%dy is not only to sol-e t+e pro$lem

    $%t also to ac %ire a sense of its scope. T+e reason for doing t+is is to

    identify t+e most $eneficial project to t+e organi,ation.

    14

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    11/62

    T+ere are t+ree aspects in t+e feasi$ility st%dy8

    1. Tec+nical 'easi$ility2. 'inancial 'easi$ility

    3. Operating 'easi$ility

    1. Tec+nical 'easi$ility

    T+e Tec+nical feasi$ility is t+e st%dy of t+e soft"are and +o" it

    is incl%ded in t+e st%dy of o%r project. 6egarding t+is t+ere are some

    tec+nical iss%es t+at s+o%ld $e noted t+ey are as follo"s8

    s t+e necessary tec+ni %e a-aila$le and +o" it is s%ggested and

    ac %ired>

    Does t+e proposed e %ipment +a-e t+e tec+nical capacity to

    +old t+e data re %ired %sing t+e ne" system>

    ill t+e system pro-ide ade %ate response t+at is made $y t+e

    re %ester at an periodic time inter-al

    Can t+is system $e expanded after t+is project de-elopment

    s t+ere a tec+ni %e g%arantees of acc%racy/ relia$ility in case of

    access of data and sec%rity

    T+e tec+nical iss%es are raised d%ring t+e feasi$ility st%dy of

    in-estigating o%r System. T+%s/ t+e tec+nical consideration e-al%ates t+e

    +ard"are re %irements/ soft"are etc. T+is system %ses ?SP as front end and

    11

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    12/62

    Oracle as $ac0 end. T+ey also pro-ide s%fficient memory to +old and

    process t+e data. #s t+e company is going to install all t+e process in t+e

    system it is t+e c+eap and efficient tec+ni %e.

    T+is system tec+ni %e accepts t+e entire re %est made $y t+e

    %ser and t+e response is done "it+o%t fail%re and delay. t is a st%dy a$o%t

    t+e reso%rces a-aila$le and +o" t+ey are ac+ie-ed as an accepta$le system.

    t is

    an essential process for analysis and definition of cond%cting a parallel

    assessment of tec+nical feasi$ility.

    T+o%g+ storage and retrie-al of information is enormo%s/ it can $e

    easily +andled $y Oracle. #s t+e oracle can $e r%n in any system and t+e

    operation does not differ from one to anot+er. So/ t+is is effecti-e.

    2. /conomical #easi)ility #inancial7

    #n organi,ation ma0es good in-estment on t+e system. So/ t+ey

    s+o%ld $e "ort+ f%ll for t+e amo%nt t+ey spend in t+e system. #l"ays t+e

    financial $enefit and e %als or less t+e cost of t+e system/ $%t s+o%ld not

    exceed t+e cost.

    T+e cost of in-estment is analy,ed for t+e entire system

    T+e cost of !ard"are and Soft"are is also noted.

    #naly,ing t+e "ay in "+ic+ t+e cost can $e red%ced

    12

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    13/62

    E-ery organi,ation "ant to red%ce t+ere cost $%t at t+e same time %ality of

    t+e

    Ser-ice s+o%ld also $e maintained. T+e system is de-eloped according t+eestimation of t+e cost made $y t+e concern. n t+is project/ t+e proposed

    system "ill definitely red%ce t+e cost and also t+e man%al "or0 is red%ced

    and speed of "or0 is also increased.

    3. ,perational #easi)ility

    Proposed project "ill $e $eneficial only "+en t+ey are t%rned into an

    information system and to meet t+e organi,ation operating re %irements.

    T+e follo"ing iss%es are considered for t+e operation8

    Does t+is system pro-ide s%fficient s%pport for t+e %ser and t+e

    management> +at is t+e met+od t+at s+o%ld $e %sed in t+is project>

    !a-e t+e %sers $een in-ol-ed in t+e planning and de-elopment of

    t+e projects>

    ill t+e proposed system ca%se any +arm/ $ad res%lt/ loss of

    control and accessi$ility of t+e system "ill lost>

    ss%es t+at may $e a minor pro$lem "ill sometimes ca%se major

    pro$lem in t+e operation. t is t+e meas%re of +o" people can a$le to "or0

    "it+ t+e system. 'inding o%t t+e minor iss%es t+at may $e t+e initial

    13

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    14/62

    pro$lem of t+e system. t s+o%ld $e a %ser*friendly en-ironment. #ll t+ese

    aspect s+o%ld $e 0ept in mind and steps s+o%ld $e ta0en for de-eloping t+e

    project caref%lly.

    6egarding t+e project/ t+e system is -ery m%c+ s%pported and friendly

    for t+e %ser. T+e met+ods are defined in an effecti-e manner and proper

    conditions are gi-en in ot+er to a-oid t+e +arm or loss of data. t is designed

    in 7@ interface/ as "or0ing "ill $e easier and flexi$le for t+e %ser.

    T+ey are t+ree $asic feasi$ility st%dies t+at are done in e-ery project.

    1

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    15/62

    /8isting System

    Aost existing approac+es are $ased on traffic analysis. Passi-e traffic analysis

    tec+ni %e "ill record t+e traffic passi-ely and identify t+e correlation $et"een sender9so%t$o%nd traffic and recei-er9s in$o%nd traffic $ased on statistical meas%res. T+is type of

    tec+ni %e re %ires a relati-ely long period of traffic o$ser-ation for a reasona$le

    detection rate. T+e idea is to acti-ely introd%ce special signals into t+e sender9s o%t$o%nd

    traffic "it+ t+e intention of recogni,ing t+e em$edded signal at t+e recei-er9s in$o%nd

    traffic. Encryption does not "or0/ since pac0et +eaders still re-eal a great deal a$o%t

    %sers.

    Disad9antageEncryption does not "or0/ since pac0et +eaders still re-eal a greatdeal a$o%t %sers.

    1&

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    16/62

    -roposed System

    n t+is project/ "e foc%s on t+e acti-e "atermar0ing tec+ni %e/ "+ic+ +as $een

    acti-e in t+e past fe" years. proposed a flo"*mar0ing sc+eme $ased on t+e direct

    se %ence spread spectr%m tec+ni %e $y %tili,ing a pse%do*noise code. y interfering

    "it+ t+e rate of a s%spect sender9s traffic and marginally c+anging t+e traffic rate/ t+e

    attac0er can em$ed a secret spread*spectr%m signal into t+e target traffic. T+e em$edded

    signal is carried along "it+ t+e target traffic from t+e sender to t+e recei-er/ so t+e

    in-estigator can recogni,e t+e corresponding comm%nication relations+ip/ tracing t+e

    messages despite t+e %se of anonymo%s net"or0s. !o"e-er/ in order to acc%rately

    confirm t+e anonymo%s comm%nication relations+ip of %sers/ t+e flo"*mar0ing sc+eme

    needs to em$ed a signal mod%lated $y a relati-ely long lengt+ of PN code/ and also t+e

    signal is em$edded into t+e traffic flo" rate -ariation. !o%mansadr et al. proposed a

    non$lind net"or0 flo" "atermar0ing sc+eme called 6# N O for stepping stone

    detection.

    Ad9antage#cti-e "atermar0ing tec+ni %e can red%ce attac0 lasting time.

    mpro-e attac0 s%ccess rate and +as recently recei-ed more attention.

    1:

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    17/62

    HA D:A / S-/&I#I&A I,+

    System 8 Penti%m ) 2. 7!,.

    !ard Dis0 8 4 7 .

    'loppy Dri-e 8 1. A$.

    Aonitor 8 1& )7# Colo%r.

    Ao%se 8 (ogitec+.

    6am 8 &12 A$.

    1;

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    18/62

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    19/62

    A(,0 S,# :A /4.1 #eatures ,#. +et

    Aicrosoft .NET is a set of Aicrosoft soft"are tec+nologies for rapidly

    $%ilding and integrating BA( e$ ser-ices/ Aicrosoft indo"s*$ased applications/ and

    e$ sol%tions. T+e .NET 'rame"or0 is a lang%age*ne%tral platform for "riting programs

    t+at can easily and sec%rely interoperate. T+ere9s no lang%age $arrier "it+ .NET8 t+ere

    are n%mero%s lang%ages a-aila$le to t+e de-eloper incl%ding Aanaged C / C / )is%al

    asic and ?a-a Script. T+e .NET frame"or0 pro-ides t+e fo%ndation for components to

    interact seamlessly/ "+et+er locally or remotely on different platforms. t standardi,es

    common data types and comm%nications protocols so t+at components created in

    different lang%ages can easily interoperate.

    F.NETG is also t+e collecti-e name gi-en to -ario%s soft"are components

    $%ilt %pon t+e .NET platform. T+ese "ill $e $ot+ prod%cts H)is%al St%dio.NET and

    indo"s.NET Ser-er/ for instanceI and ser-ices Hli0e Passport/ .NET Ay Ser-ices/ and

    so onI.

    H/ .+/ # A /:, ;

    T+e .NET 'rame"or0 +as t"o main parts8

    1. T+e Common (ang%age 6%ntime HC(6I.

    2. # +ierarc+ical set of class li$raries.

    T+e C(6 is descri$ed as t+e Fexec%tion engineG of .NET. t pro-ides t+e en-ironment

    "it+in "+ic+ programs r%n. T+e most important feat%res are

    1=

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    20/62

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    21/62

    descri$ing types in a common "ay. CTS define +o" types "or0 "it+in t+e r%ntime/

    "+ic+ ena$les types in one lang%age to interoperate "it+ types in anot+er lang%age/

    incl%ding cross*lang%age exception +andling. #s "ell as ens%ring t+at types are only %sed

    in appropriate "ays/ t+e r%ntime also ens%res t+at code doesn9t attempt to access memory

    t+at +asn9t $een allocated to it.

    &ommon anguage Specification

    T+e C(6 pro-ides $%ilt*in s%pport for lang%age interopera$ility. To ens%re t+at

    yo% can de-elop managed code t+at can $e f%lly %sed $y de-elopers %sing any

    programming lang%age/ a set of lang%age feat%res and r%les for %sing t+em called t+eCommon (ang%age Specification HC(SI +as $een defined. Components t+at follo" t+ese

    r%les and expose only C(S feat%res are considered C(S*compliant.

    H/ & ASS I( A *

    .NET pro-ides a single*rooted +ierarc+y of classes/ containing o-er ;444

    types. T+e root of t+e namespace is called SystemJ t+is contains $asic types li0e yte/

    Do%$le/ oolean/ and String/ as "ell as O$ject. #ll o$jects deri-e from System. O$ject.

    #s "ell as o$jects/ t+ere are -al%e types. )al%e types can $e allocated on t+e stac0/ "+ic+

    can pro-ide %sef%l flexi$ility. T+ere are also efficient means of con-erting -al%e types to

    o$ject types if and "+en necessary.

    T+e set of classes is pretty compre+ensi-e/ pro-iding collections/ file/

    screen/ and net"or0 KO/ t+reading/ and so on/ as "ell as BA( and data$ase connecti-ity.

    T+e class li$rary is s%$di-ided into a n%m$er of sets Hor namespacesI/ eac+

    pro-iding distinct areas of f%nctionality/ "it+ dependencies $et"een t+e namespaces 0ept

    to a minim%m.

    21

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    22/62

    A+

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    23/62

    #cti-e State +as created )is%al Perl and )is%al Pyt+on/ "+ic+ ena$le

    .NET*a"are applications to $e $%ilt in eit+er Perl or Pyt+on. ot+ prod%cts can $e

    integrated into t+e )is%al St%dio .NET en-ironment. )is%al Perl incl%des s%pport for

    #cti-e State9s Perl De- Lit.

    Ot+er lang%ages for "+ic+ .NET compilers are a-aila$le incl%de

    'O6T6#N

    CO O(

    Eiffel

    'ig1 . Net 'rame"or0

    #SP.NET

    BA( E SE6) CES

    indo"s 'orms

    ase Class (i$raries

    Common (ang%age 6%ntime Operating System

    C .NET is also compliant "it+ C(S HCommon (ang%age SpecificationI and s%pports

    str%ct%red exception +andling. C(S is set of r%les and constr%cts t+at are s%pported $y

    t+e C(6 HCommon (ang%age 6%ntimeI. C(6 is t+e r%ntime en-ironment pro-ided $y

    t+e .NET 'rame"or0J it manages t+e exec%tion of t+e code and also ma0es t+e

    de-elopment process easier $y pro-iding ser-ices.

    23

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    24/62

    C .NET is a C(S*compliant lang%age. #ny o$jects/ classes/ or components t+at

    created in C .NET can $e %sed in any ot+er C(S*compliant lang%age. n addition/ "e

    can %se o$jects/ classes/ and components created in ot+er C(S*compliant lang%ages

    in C .NET .T+e %se of C(S ens%res complete interopera$ility among applications/

    regardless of t+e lang%ages %sed to create t+e application.

    &,+S 0& , S A+D D/S 0& , S

    Constr%ctors are %sed to initiali,e o$jects/ "+ereas destr%ctors are %sed to

    destroy t+em. n ot+er "ords/ destr%ctors are %sed to release t+e reso%rces allocated to

    t+e o$ject. n C .NET t+e s%$ finali,e proced%re is a-aila$le. T+e s%$ finali,e

    proced%re is %sed to complete t+e tas0s t+at m%st $e performed "+en an o$ject is

    destroyed. T+e s%$ finali,e proced%re is called a%tomatically "+en an o$ject is

    destroyed. n addition/ t+e s%$ finali,e proced%re can $e called only from t+e class it

    $elongs to or from deri-ed classes.

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    25/62

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    26/62

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    27/62

    Design =iew

    To $%ild or modify t+e str%ct%re of a ta$le "e "or0 in t+e ta$le

    design -ie". e can specify "+at 0ind of data "ill $e +old.

    Datas$eet =iew

    To add/ edit or analyses t+e data itself "e "or0 in ta$les datas+eet

    -ie" mode.

    ?0/ *

    # %ery is a %estion t+at +as to $e as0ed t+e data. #ccess gat+ers data t+at

    ans"ers t+e %estion from one or more ta$le. T+e data t+at ma0e %p t+e ans"er is eit+er

    dynaset Hif yo% edit itI or a snaps+ot Hit cannot $e editedI.Eac+ time "e r%n %ery/ "e getlatest information in t+e dynaset. #ccess eit+er displays t+e dynaset or snaps+ot for %s to

    -ie" or perform an action on it/ s%c+ as deleting or %pdating.

    2;

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    28/62

    I+ ,D0& I,+ , =(S& I-

    ) Script $rings professional programming tec+ni %es to

    !TA( "e$ doc%ments. it+ ) Script/ "e can create doc%ments and

    applications t+at pre-io%sly co%ld only +a-e $een made a-aila$le as a

    des0top program "ritten "it+ somet+ing li0e )is%al asic. t gi-es %s t+e

    a$ility to interact "it+ and manip%late !TA( doc%ments directly from

    t+e $ro"ser. it+ ) Script/ "e can e-en interact "it+ and manip%late

    t+e $ro"ser it/ sending it instr%ctions from o%r ) Script program/ and

    p%lling in its -aria$les for o%r o"n %se.

    #$o-e all/ ) Script $rings to %s tr%e client*side processing/ so

    let s $riefly loo0 at some of t+e main %ses of ) Script8

    6eference and manip%late doc%ment o$jects

    6eference and manip%late t+e $ro"ser

    6eference t+e contents of anot+er loaded doc%ment or doc%ments

    Create a doc%ment on t+e fly from t+e $ro"ser

    Store/ reference/ and manip%late data inp%t $y t+e %ser

    Store/ reference/ and manip%late data do"nloaded from t+e ser-er

    Perform calc%lations on data

    Display messages to t+e %ser

    2

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    29/62

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    30/62

    DA A # ,: DIA< A

    SERVER CLIENTROUTER

    IP Address

    Flle Name

    Browse areceived path

    E d

    Se d File

    Select Path

    Se d

    !ecr"ptio

    E cr"ptio

    Se d File

    34

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    31/62

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    32/62

    SERVERCLIENT

    FILE RECEIVE

    Se d File

    ROUTER

    IP Address

    FILE RECEIVE

    Select aReceivi # Path

    Select Path

    Se d

    E cr"ptio

    !ecr"ptio

    32

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    33/62

    Se %ence Diagram8

    SERVER CLIENTROUTER

    $e" Se d

    E cr"ptio

    !ecr"ptio

    Ac% owled#eme t

    File Received

    &essa#e Se d

    33

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    34/62

    @se Case Diagram8

    SERVERCLIENT

    IP Address

    Encryption

    ROUTER

    Select Path

    Sned

    File Name

    Receive path

    Send File

    Decryption

    3

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    35/62

    &,D/ D/SI

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    36/62

    else Q if HText ox2 I Q string myString)aria$le1 string .EmptyJ

    myString)aria$le1 Enter Pass"ord J

    R else Q if HText ox1 SE6)E6 UU Text ox2 SE6)E6 I Q t+is.!ideHIJ smssend p%d ne" smssend HIJ p%d.S+o"DialogHIJ R

    else Q string myString)aria$le1 string .EmptyJ myString)aria$le1 Enter @serNameKPass"ord Correcly. J

    R R R R

    R

    pri-ate -oid 'orm1 (oadH o$ject sender/ E-ent#rgs eI Q

    R RR

    3:

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    37/62

    SEND ' (E8

    %sing SystemJ%sing System.Collections.7enericJ

    %sing System.ComponentAodelJ%sing System.DataJ%sing System.Dra"ingJ%sing System.(in J%sing System.TextJ%sing System. indo"s.'ormsJ%sing System.Net.Soc0etsJ%sing System.NetJ%sing System. OJ%sing System.7lo$ali,ationJ

    namespace CellCo%ntingser-er Q p%$lic partial class smssend 8 'orm Q string ser1J string fileDes/ fileiniJ string fileDes1/ fileini1J int lenJ int len1J

    p%$lic smssendHI Q nitiali,eComponentHIJ R

    pri-ate -oid smssend (oadH o$ject sender/ E-ent#rgs eI Q $tntransform.Ena$led false J t+is.open'ileDialog1.A%ltiselect tr%eJ

    KKpict%re ox;.)isi$le tr%eJ KK$tntransform.Ena$led falseJ KKt+is.open'ileDialog1.A%ltiselect tr%eJ la$el3.)isi$le falseJ

    KKla$el .)isi$le falseJ KKla$el&.)isi$le falseJ KKla$el:.)isi$le falseJ

    3;

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    38/62

    R

    p%$lic -oid sendHI

    Q try Q

    P#ddress VW ip#ddress Dns .7et!ost#ddressesHtext ox1.TextIJ PEndPoint ipEnd ne" PEndPoint Hip#ddressV4W/ &:&&IJ Soc0et clientSoc0 ne" Soc0et H#ddress'amily . nterNet"or0/Soc0etType .Stream/ ProtocolType . PIJ string filePat+ J

    int co%nt 4J

    fileDes fileDes.6eplaceH XX/ K IJ "+ile HfileDes. ndexOfH K I Y *1I Q filePat+ fileDes.S%$stringH4/ fileDes. ndexOfH K I 1IJ fileDes fileDes.S%$stringHfileDes. ndexOfH K I 1IJ co%nt J R $yte VW fileName yte Encoding .#SC .7et ytesHfileDesIJ l$lError.Text J l$lError.Text %ffering ... J $yte VW fileData 'ile .6ead#ll ytesHfilePat+ fileDesIJ $yte VW clientData ne" $yte V fileName yte.(engt+ fileData.(engt+WJ $yte VW fileName(en itCon-erter .7et ytesHfileName yte.(engt+IJ fileName(en.CopyToHclientData/ 4IJ fileName yte.CopyToHclientData/ IJ fileData.CopyToHclientData/ fileName yte.(engt+IJ l$lError.Text J l$lError.Text Connection to ser-er ... J clientSoc0.ConnectHipEndIJ l$lError.Text J l$lError.Text 'ile sending... J System.T+reading. T+read .SleepH&444IJ clientSoc0.SendHclientDataIJ l$lError.Text 'ile sending... J #pplication .DoE-entsHIJ l$lError.Text J l$lError.Text Disconnecting... J clientSoc0.CloseHIJ

    3

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    39/62

    l$lError.Text J l$lError.Text 'ile transferred. J

    R

    catc+ HException exI Q if Hex.Aessage # connection attempt failed $eca%se t+e connected partydid not properly respond after a period of time/ or esta$lis+ed connection failed $eca%seconnected +ost +as failed to respond I Q l$lError.Text J l$lError.Text No S%c+ System #-aila$le Try ot+er P J

    R else Q if Hex.Aessage No connection co%ld $e made $eca%se t+e target mac+ineacti-ely ref%sed it I Q l$lError.Text J l$lError.Text 'ile Sending fail. eca%se ser-er not r%nning. J R else Q l$lError.Text J l$lError.Text 'ile Sending fail. ex.AessageJ R R R R

    pri-ate -oid $tntransform Clic0H o$ject sender/ E-ent#rgs eI Q pict%re ox

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    40/62

    sendHIJ

    R

    pri-ate -oid $tn$ro"se Clic0 1H o$ject sender/ E-ent#rgs eI

    Q txt'ilePat+.Text J open'ileDialog1.S+o"DialogHIJ txt'ilePat+.Text open'ileDialog1.'ileNameJ fileDes open'ileDialog1.'ileNameJ

    if HfileDes open'ileDialog1 I Q l$lError.Text J l$lError.'oreColor System.Dra"ing. Color .6edJ l$lError.Text Select a 'ile first J

    txt'ilePat+.Text J $tntransform.Ena$led false J R else Q pict%re ox;.)isi$le tr%eJ pict%re ox;. mage CellCo%ntingser-er.Properties. 6eso%rces .ajax loaderJ #pplication .DoE-entsHIJ System.T+reading. T+read .SleepH&44IJ

    len fileDes.(engt+J fileini fileDes.S%$stringHfileDes. ndexOfH XXI 1IJ $tntransform.Ena$led tr%eJ R R

    pri-ate -oid pict%re ox; Clic0H o$ject sender/ E-ent#rgs eI Q

    R

    RR

    6O@TE68

    4

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    41/62

    %sing SystemJ%sing System.Collections.7enericJ%sing System.ComponentAodelJ%sing System.DataJ

    %sing System.Dra"ingJ%sing System.(in J%sing System.TextJ%sing System. indo"s.'ormsJ%sing Zed7rap+J

    namespace 6o%terCodeCOCOQ p%$lic partial class C+art 8 'orm Q p%$lic string VW txt ne" string V

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    42/62

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    43/62

    ,gc. sS+o"ContextAen% false J ,gc. sS+o"Point)al%es tr%eJ ,gc.#xisC+angeHIJ

    ,gp1.6efres+HIJ R

    pri-ate -oid sortHdo%$leVW -/string VW lI Q do%$le tmp/ tmp2J string ltempJ int jJ for Hint i 4J i [ -.(engt+ * 1J i I Q for Hj 4J j [ -.(engt+ * 1 * iJ j I

    if H-Vj 1W Y -VjWI QK] compare t+e t"o neig+$o%rs ]K tmp -VjWJK] s"ap aVjW and aVj 1W ]K ltemp lVjWJ -VjW -Vj 1WJ lVjW lVj 1WJ -Vj 1W tmpJ lVj 1W ltempJ R tmp2 -VjWJ R R

    RR

    3

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    44/62

    S& //+ A*,0

    SE6)E6

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    45/62

    Select file8

    &

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    46/62

    SEND ' (E8

    :

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    47/62

    ST#T@S8

    ;

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    48/62

    6O@TE68

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    49/62

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    50/62

    ENC6 PT ON U DEC6 PT ON8

    &4

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    51/62

    6ECE ) ND P6OP#P ( T 8

    &1

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    52/62

    6O@TE6 P6O # ( T 8

    &2

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    53/62

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    54/62

    Integration testing

    ntegration tests are designed to test integrated soft"are components

    to determine if t+ey act%ally r%n as one program. Testing is e-ent dri-enand is more concerned "it+ t+e $asic o%tcome of screens or fields.

    ntegration tests demonstrate t+at alt+o%g+ t+e components "ere

    indi-id%ally satisfaction/ as s+o"n $y s%ccessf%lly %nit testing/ t+e

    com$ination of components is correct and consistent. ntegration testing is

    specifically aimed at exposing t+e pro$lems t+at arise from t+e

    com$ination of components.

    #unctional test

    '%nctional tests pro-ide systematic demonstrations t+at f%nctions tested

    are a-aila$le as specified $y t+e $%siness and tec+nical re %irements/ system

    doc%mentation/ and %ser man%als.

    '%nctional testing is centered on t+e follo"ing items8

    )alid np%t 8 identified classes of -alid inp%t m%st $e accepted.

    n-alid np%t 8 identified classes of in-alid inp%t m%st $e rejected.

    '%nctions 8 identified f%nctions m%st $e exercised.

    O%tp%t 8 identified classes of application o%tp%ts m%st $e

    exercised.SystemsKProced%res8 interfacing systems or proced%res m%st $e in-o0ed.

    Organi,ation and preparation of f%nctional tests is foc%sed on

    re %irements/ 0ey f%nctions/ or special test cases. n addition/ systematic

    &

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    55/62

    co-erage pertaining to identify %siness process flo"sJ data fields/

    predefined processes/ and s%ccessi-e processes m%st $e considered for

    testing. efore f%nctional testing is complete/ additional tests are identified

    and t+e effecti-e -al%e of c%rrent tests is determined.

    System est

    System testing ens%res t+at t+e entire integrated soft"are system meets

    re %irements. t tests a config%ration to ens%re 0no"n and predicta$le

    res%lts. #n example of system testing is t+e config%ration oriented system

    integration test. System testing is $ased on process descriptions and flo"s/emp+asi,ing pre*dri-en process lin0s and integration points.

    :$ite (o8 esting

    +ite ox Testing is a testing in "+ic+ in "+ic+ t+e soft"are tester +as

    0no"ledge of t+e inner "or0ings/ str%ct%re and lang%age of t+e soft"are/ or

    at least its p%rpose. t is p%rpose. t is %sed to test areas t+at cannot $e

    reac+ed from a $lac0 $ox le-el.

    (lac (o8 esting

    lac0 ox Testing is testing t+e soft"are "it+o%t any 0no"ledge of t+e

    inner "or0ings/ str%ct%re or lang%age of t+e mod%le $eing tested. lac0 $ox

    tests/ as most ot+er 0inds of tests/ m%st $e "ritten from a definiti-e so%rce

    doc%ment/ s%c+ as specification or re %irements doc%ment/ s%c+ as

    specification or re %irements doc%ment. t is a testing in "+ic+ t+e soft"are

    %nder test is treated/ as a $lac0 $ox .yo% cannot FseeG into it. T+e test

    pro-ides inp%ts and responds to o%tp%ts "it+o%t considering +o" t+e

    soft"are "or0s.

    &&

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    56/62

    0nit esting

    @nit testing is %s%ally cond%cted as part of a com$ined code and %nit

    test p+ase of t+e soft"are lifecycle/ alt+o%g+ it is not %ncommon for coding

    and %nit testing to $e cond%cted as t"o distinct p+ases.

    Test strategy and approach

    'ield testing "ill $e performed man%ally and f%nctional tests "ill $e

    "ritten in detail.

    est o)Becti9es

    #ll field entries m%st "or0 properly.

    Pages m%st $e acti-ated from t+e identified lin0.

    T+e entry screen/ messages and responses m%st not $e delayed.

    #eatures to )e tested

    )erify t+at t+e entries are of t+e correct format

    No d%plicate entries s+o%ld $e allo"ed

    #ll lin0s s+o%ld ta0e t+e %ser to t+e correct page.

    Integration esting

    &:

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    57/62

    Soft"are integration testing is t+e incremental integration testing of

    t"o or more integrated soft"are components on a single platform to prod%ce

    fail%res ca%sed $y interface defects.

    T+e tas0 of t+e integration test is to c+ec0 t+at components orsoft"are applications/ e.g. components in a soft"are system or ^ one step %p

    ^ soft"are applications at t+e company le-el ^ interact "it+o%t error.

    est esults #ll t+e test cases mentioned a$o-e passed s%ccessf%lly. No

    defects enco%ntered.

    Acceptance esting

    @ser #cceptance Testing is a critical p+ase of any project and re %ires

    significant participation $y t+e end %ser. t also ens%res t+at t+e systemmeets t+e f%nctional re %irements.

    est esults #ll t+e test cases mentioned a$o-e passed s%ccessf%lly. No

    defects enco%ntered.

    S*S / I - / /+ A I,+

    mplementation is t+e stage of t+e project "+en t+e t+eoretical design

    is t%rned o%t into a "or0ing system. T+%s it can $e considered to $e t+e most

    &;

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    58/62

    critical stage in ac+ie-ing a s%ccessf%l ne" system and in gi-ing t+e %ser/

    confidence t+at t+e ne" system "ill "or0 and $e effecti-e.

    T+e implementation stage in-ol-es caref%l planning/ in-estigation of

    t+e existing system and it9s constraints on implementation/ designing ofmet+ods to ac+ie-e c+angeo-er and e-al%ation of c+angeo-er met+ods.

    &

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    59/62

    #0 0 / /+HA+&/ /+

    &=

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    60/62

    &,+& 0SI,+

    n t+is project/ "e introd%ced a no-el cell*co%nting*$ased attac0 against Tor. T+is

    attac0 is iffic%lt to detect and is a$le to %ic0ly and acc%rately confirm t+e anonymo%s

    comm%nication relations+ip among %sers on Tor. #n attac0er at t+e malicio%s exit onion

    ro%ter slig+tly manip%lates t+e transmission of cells from a target TCP stream and

    em$eds a secret signal Ha series of $inary $itsI into t+e cell co%nter -ariation of t+e TCP

    stream. #n accomplice of t+e attac0er at t+e entry onion ro%ter recogni,es t+e em$edded

    signal %sing o%r de-eloped reco-ery algorit+ms and lin0s t+e comm%nication relations+ip

    among %sers. O%r t+eoretical analysis s+o"s t+at t+e detection rate is a monotono%sly

    increasing f%nction "it+ respect to t+e delay inter-al and is a monotono%sly decreasing

    f%nction of t+e -ariance of one "ay transmission delay along a circ%it. )ia extensi-e real*

    "orld experiments on Tor/ t+e effecti-eness and feasi$ility of t+e attac0 is -alidated. O%r

    data s+o"ed t+at t+is attac0 co%ld drastically and %ic0ly degrade t+e anonymity ser-ice

    t+at Tor pro-ides. D%e to Tor9s f%ndamental design/ defending against t+is attac0 remains

    a -ery c+allenging tas0 t+at "e "ill in-estigate in o%r

    f%t%re researc+.

    :4

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    61/62

    (I(I I,< A-H*

    7ood Teac+ers are "ort+ more t+an t+o%sand $oo0s/ "e +a-e t+em in O%r

    Department

    eferences ade #rom

    1. @ser nterfaces in C 8 indo"s 'orms and C%stom Controls $y Aatt+e"

    AacDonald.

    2. #pplied Aicrosoft_ .NET 'rame"or0 Programming HPro*De-eloperI $y ?effrey

    6ic+ter.

    3. Practical .Net2 and C 28 !arness t+e Platform/ t+e (ang%age/ and t+e 'rame"or0

    $y Patric0 Smacc+ia.

    . Data Comm%nications and Net"or0ing/ $y e+ro%, # 'oro%,an.&. Comp%ter Net"or0ing8 # Top*Do"n #pproac+/ $y ?ames '. L%rose.

    :. 7a$riel 6. itran and 6ene Caldentey. #n o-er-ie" of pricing

    models for re-en%e management.

    ;. N. r%no and S. C+a%d+%ri. #n online approac+ to p+ysical design

    t%ning.

  • 8/13/2019 New Cell Counting Based Attack Against TOR

    62/62

    1 . 7%illermo 7allego and 7arrett -an 6y,in. Optimal Dynamic

    Pricing of n-entories "it+ Stoc+astic Demand o-er 'inite !ori,ons.

    Management Science .

    1&. #. 7+ose/ ). C+o%d+ary/ T. A%0+opad+yay/ and @. 6ajan. Dynamic

    pricing8 # strategic ad-antage for electronic retailers.

    1:. E. 7rossmann and Z. Lra-anja.

    1;. A. 7%ay and T. Z+ang. #dapti-e extrem%m see0ing control of

    nonlinear dynamic systems "it+ parametric %ncertainty.

    1