[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-relays] Overlay Networks: Research Improvements and Attacks [was: planetlab butterfly relays]



On 1/23/19, nusenu <nusenu-lists@xxxxxxxxxx> wrote:
> thanks for adding tor relays.
> If you are using them for research purposes please ensure
> you follow the safety guidelines:
> https://research.torproject.org/safetyboard.html
> https://medium.com/@nusenu/some-tor-relays-you-might-want-to-avoid-5901597ad821
> https://trac.torproject.org/projects/tor/wiki/doc/ReportingBadRelays
> |   Up |   Ext | JoinTime   | Nickname     | Version   | IP              |
> AS                                       | CC   |   ORp |   Dirp | OS    |
> Contact       |   eFamMembers | FP                                       |
> https://twitter.com/nusenu_
> https://mastodon.social/@nusenu

As many know, many guidelines regarding the stronger distributed
encrypted overlay and messaging networks out there are naturally
voluntary, and research and attacks are often generally unenforceable
and or undetectable when undertaken by qualified adversaries.
Many parties [publicly] subscribe to such guidelines,
many [silently] don't. That's the nature [and one of the
risks] of such networks, indeed of any network.
Such adversaries exist and are highly active and capable.
Know your adversary. Strengthen your designs to match
and best them.

As to the nodes, they're all planet-lab.net hosts, planetlab has
at least two known tor slices "okstate_tor" and "uml_ZhenLing",
some public research outputs [or not] of which might be listed below...

https://www.cs.uml.edu/~xinwenfu/paper/TorCellSize_ICC11_Fu.pdf
https://www.cs.uml.edu/~xinwenfu/paper/TorWard14_Fu.pdf
http://cse.seu.edu.cn/PersonalPage/zhenling/publications_files/infocom2014_TorWard_Discovery_of_Malicious_Traffic_over_Tor.pdf
http://cse.seu.edu.cn/PersonalPage/zhenling/publications_files/infocom2013_Protocol-level_Hidden_Server_Discovery.pdf
http://cse.seu.edu.cn/PersonalPage/zhenling/publications_files/infocom2012_Extensive_Analysis_and_Large-Scale_Empirical_Evaluation_of_Tor_Bridge_Discovery.pdf

https://news.okstate.edu/articles/communications/2015/tedx-returns-oklahoma-state-university-april-10-go-online-register.html
https://www.youtube.com/watch?v=9QsjkJcUznA  MEMEX Christopher White

‎Jiangmin yu, Eric Chan-Tin:
Realistic Cover Traffic to Mitigate Website Fingerprinting Attacks
DOI: 10.1109/ICDCS.2018.00175
Conference: 2018 IEEE 38th International Conference on Distributed
Computing Systems (ICDCS)
Identifying Webbrowsers in Encrypted Communications
DOI: 10.1145/2665943.2665968
Revisiting Circuit Clogging Attacks on Tor
DOI: 10.1109/ARES.2013.17
Conference: Availability, Reliability and Security (ARES), 2013 Eighth
International Conference on
https://chantin.cs.luc.edu/~chantin/ARES2013.pdf
Application Of Data Analytics - Case Studies
https://shareok.org/bitstream/handle/11244/54637/Yu_okstate_0664D_15098.pdf
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays