TorPolice: Towards Enforcing Service-Defined Access Policies in Anonymous Systems
@article{Liu2017TorPoliceTE, title={TorPolice: Towards Enforcing Service-Defined Access Policies in Anonymous Systems}, author={Zhuotao Liu and Yushan Liu and Philipp Winter and Prateek Mittal and Y. Hu}, journal={ArXiv}, year={2017}, volume={abs/1708.08162} }
Tor is the most widely used anonymity network, currently serving millions of users each day. However, there is no access control in place for all these users, leaving the network vulnerable to botnet abuse and attacks. For example, criminals frequently use exit relays as stepping stones for attacks, causing service providers to serve CAPTCHAs to exit relay IP addresses or blacklisting them altogether, which leads to severe usability issues for legitimate Tor users. To address this problem, we… Expand
Supplemental Presentations
Figures, Tables, and Topics from this paper
3 Citations
TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network
- Computer Science
- 2017 IEEE 25th International Conference on Network Protocols (ICNP)
- 2017
- 14
- PDF
Privacy Pass: Bypassing Internet Challenges Anonymously
- Computer Science
- Proc. Priv. Enhancing Technol.
- 2018
- 15
- Highly Influenced
- PDF
References
SHOWING 1-10 OF 55 REFERENCES
TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network
- Computer Science
- 2017 IEEE 25th International Conference on Network Protocols (ICNP)
- 2017
- 14
- PDF
Formalizing Anonymous Blacklisting Systems
- Computer Science
- 2011 IEEE Symposium on Security and Privacy
- 2011
- 41
- PDF
Nymble: Blocking Misbehaving Users in Anonymizing Networks
- Computer Science
- IEEE Transactions on Dependable and Secure Computing
- 2011
- 119
- PDF
Low-cost traffic analysis of Tor
- Computer Science
- 2005 IEEE Symposium on Security and Privacy (S&P'05)
- 2005
- 595
- PDF
Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting
- Computer Science
- CCS '11
- 2011
- 104
- PDF
MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the Internet
- Computer Science
- CCS
- 2016
- 29
- PDF