Logo des Repositoriums
 

Abusers don’t get Privacy. Sensitively Logging and Blocking Tor Abuse

dc.contributor.authorMarx, Matthias
dc.contributor.editorReinhardt, Delphine
dc.contributor.editorLangweg, Hanno
dc.contributor.editorWitt, Bernhard C.
dc.contributor.editorFischer, Mathias
dc.date.accessioned2020-02-04T13:41:55Z
dc.date.available2020-02-04T13:41:55Z
dc.date.issued2020
dc.description.abstractTor has a significant problem with malicious traffic routed through Tor exit nodes. They create a credible reason for websites to discriminate against Tor users. The abuse also creates a strong disincentive to run exit nodes since the exit node operators have to deal with abuse messages and possible law enforcement interactions. We want to detect and mitigate the attacks that happen through Tor exit nodes without undermining Tor users’ anonymity and privacy. We use a modified version of the Tor exit node to enable NIDS (Network Intrusion Detection) monitoring and termination of malicious activity on a per-circuit level. We use the Zeek IDS (formerly Bro) to detect attacks using robust mechanisms that have very low false positive rates. Initial results indicate that, using our approach, the number of abuse cases can be reduced.en
dc.identifier.doi10.18420/sicherheit2020_16
dc.identifier.isbn978-3-88579-695-4
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/31785
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofSICHERHEIT 2020
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-301
dc.subjectTor
dc.subjectMalicious Traffic
dc.subjectIntrusion Detection System
dc.titleAbusers don’t get Privacy. Sensitively Logging and Blocking Tor Abuseen
dc.typeText/Conference Paper
gi.citation.endPage158
gi.citation.publisherPlaceBonn
gi.citation.startPage153
gi.conference.date17.-20. März 2020
gi.conference.locationGöttingen, Germany
gi.conference.sessiontitleDoktorandenforum

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
C1-5.pdf
Größe:
117.13 KB
Format:
Adobe Portable Document Format