Skip navigation
Please use this identifier to cite or link to this item: http://arks.princeton.edu/ark:/88435/dsp01dv13zx07d
Full metadata record
DC FieldValueLanguage
dc.contributor.advisorMittal, Prateek-
dc.contributor.authorMondal, Avishek-
dc.date.accessioned2019-08-19T12:00:32Z-
dc.date.available2019-08-19T12:00:32Z-
dc.date.created2019-04-22-
dc.date.issued2019-08-19-
dc.identifier.urihttp://arks.princeton.edu/ark:/88435/dsp01dv13zx07d-
dc.description.abstractThe Tor network is vulnerable to both passive attacks as well as active attacks that manipulate network routing. These attacks degrade a client’s anonymity and privacy. Location based path selection algorithms, such as DeNASA and Counter-RAPTOR have been suggested to increase the network’s resilience to such active attacks. However, these selection schemes depend on the client’s location, and thus, over multiple selections leak probabilistic information about the client’s identity. This leaves a client vulnerable to statistical fingerprinting attacks. An autonomous system (AS) level adversary can observe these guard selections and deanonymise Tor clients. This work proposes and investigates the use of client aliasing. Client aliasing is when client ASes are clustered together, and member ASes mimic the guard selection behaviour of the cluster representative. Clustering provides a minimum anonymity set for Tor clients, which makes them resilient to statistical fingerprinting attacks, since an AS level adversary may be able to locate the cluster of ASes that the client is from, but will not be able to pinpoint the specific AS the Tor client is from. It is expected however, that when member ASes mimic the guard selection behaviour of the representative AS, some of the resilience gained from location based path selection will be lost. Client aliasing on the DeNASA algorithm is investigated. Several metrics are tested and presented. The results show that using client aliasing can be used to mitigate against fingerprinting attacks without significantly degrading the security properties of using location based path selection schemes against active attacks.en_US
dc.format.mimetypeapplication/pdf-
dc.language.isoenen_US
dc.titleMitigating Fingerprinting Attacks Against Location Based Path Selection in Toren_US
dc.typePrinceton University Senior Theses-
pu.date.classyear2019en_US
pu.departmentElectrical Engineeringen_US
pu.pdf.coverpageSeniorThesisCoverPage-
pu.contributor.authorid961167553-
Appears in Collections:Electrical Engineering, 1932-2020

Files in This Item:
File Description SizeFormat 
MONDAL-AVISHEK-THESIS.pdf1.16 MBAdobe PDF    Request a copy


Items in Dataspace are protected by copyright, with all rights reserved, unless otherwise indicated.