Paper 2021/374
ZXAD: High-volume Attack Mitigation for Tor
Akshaya Mani and Ian Goldberg
Abstract
The Tor anonymity network is often abused by some attackers to (anonymously) convey attack traffic. These attacks abuse Tor exit relays (i.e., the relays through which traffic exits Tor) by making it appear the attack originates there; as a result, many website operators indiscriminately block all Tor traffic (by blacklisting all exit IPs), reducing the usefulness of Tor. Recent research shows that majority of these attacks are ones that generate high traffic volume (e.g., Denial-of-Service attacks). This suggests that a simple solution such as throttling traffic flow at the Tor exits may permit early detection of these attacks, improve overall reputation of exits, and eventually prevent blanket blocking of Tor exits. However, naively monitoring and throttling traffic at the Tor exits can endanger the privacy of the network's users. This paper introduces ZXAD (pronounced "zed-zad"), a zero-knowledge based _private_ Tor exit abuse detection system that permits identification of otherwise unlinkable connections that are part of a high-volume attack. ZXAD does not reveal any information, apart from the fact that some user is conveying a high volume of traffic through Tor. We formally prove the correctness and security of ZXAD. We also measure two proof-of-concept implementations of our zero-knowledge proofs and show that ZXAD operates with low bandwidth and processing overheads.
Metadata
- Available format(s)
- Category
- Applications
- Publication info
- Published elsewhere. Minor revision. WPES 2021
- DOI
- 10.1145/3463676.3485609
- Keywords
- anonymityprivacy enhancing technologieszero knowledge
- Contact author(s)
-
akshaya mani @ uwaterloo ca
iang @ uwaterloo ca - History
- 2021-09-22: revised
- 2021-03-22: received
- See all versions
- Short URL
- https://ia.cr/2021/374
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2021/374, author = {Akshaya Mani and Ian Goldberg}, title = {{ZXAD}: High-volume Attack Mitigation for Tor}, howpublished = {Cryptology {ePrint} Archive, Paper 2021/374}, year = {2021}, doi = {10.1145/3463676.3485609}, url = {https://eprint.iacr.org/2021/374} }