user_image

Rob G. Jansen, PhD

Computer Scientist, Researcher, and Principal Investigator
U.S. Naval Research Laboratory, Washington, DC, USA

Publication Details

  1. Citation

    Rob Jansen, Tavish Vaidya, and Micah Sherr:
    Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor. USENIX Security Symposium, 2019.

    Author Links

    Venue Links

    Transitions

    Our work influenced the authenticated SENDMEs defense deployed in Tor v0.4.1 on 2019-08-20

    Media Mentions

    ZDNet
    SecurityWeek

    Abstract

    As the Tor network has grown in popularity and importance as a tool for privacy-preserving online communication, it has increasingly become a target for disruption, censorship, and attack. A large body of existing work examines Tor’s susceptibility to attacks that attempt to block Tor users’ access to information (e.g., via traffic filtering), identify Tor users’ communication content (e.g., via traffic fingerprinting), and de-anonymize Tor users (e.g., via traffic correlation). This paper focuses on the relatively understudied threat of denial-of-service (DoS) attacks against Tor, and specifically, DoS attacks that intelligently utilize bandwidth as a means to significantly degrade Tor network performance and reliability. We demonstrate the feasibility of several bandwidth DoS attacks through live-network experimentation and high-fidelity simulation while quantifying the cost of each attack and its effect on Tor performance. First, we explore an attack against Tor’s most commonly used default bridges (for censorship circumvention) and estimate that flooding those that are operational would cost 17K/mo. and could reduce client throughput by 44% while more than doubling bridge maintenance costs. Second, we explore attacks against the TorFlow bandwidth measurement system and estimate that a constant attack against all TorFlow scanners would cost 2.8K/mo. and reduce the median client download rate by 80%. Third, we explore how an adversary could use Tor to congest itself and estimate that such a congestion attack against all Tor relays would cost $1.6K/mo. and increase the median client download time by 47%. Finally, we analyze the effects of Sybil DoS and deanonymization attacks that have costs comparable to those of our attacks.

    Bibtex

    @inproceedings{pointbreak-sec2019,
      title = {Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor},
      author = {Jansen, Rob and Vaidya, Tavish and Sherr, Micah},
      booktitle = {USENIX Security Symposium},
      year = {2019},
    }