[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-dev] TOR SoP proposal: extending and improving TOR network anomaly detection



Hi Philipp,

Thanks for your reply. I mean Tor the network. Not integrated into the
protocol itself. Sorry for the poor wording. So it would work as
exitmap, HonerConnector, and TorDoctor.

> And do you already have some concrete ideas about detecting
> anomalies? It's an interesting topic, but also a theory-heavy one.
> If we don't have good ideas about concrete things to work on, we
> can easily spend all three months researching, which is not quite
> what TSoC is about.

Agreed. I underestimated how much research it would take, and I haven't
had the time this week to look more in-depth into pre-existing projects
and research to really gauge this.

Since the scale / shape of the project is currently incompatible with
TSoP, I won't submit it (I could, but it doesn't make much sense).

*However* I still want to contribute to this field, and I think I can
look into getting my university to fund me for the summer instead, so I
can work towards financial independence.

I'll get back in touch soon once things settle down here.

Cheers,
Kibo


On Wed, 15 Apr 2015 17:28:32 +0200
Philipp Winter <phw@xxxxxxxxx> wrote:

> On Tue, Apr 14, 2015 at 01:38:54AM -0400, Kibo Schaffer wrote:
> > I want to improve TOR's ability to detect anomalies such as sybil
> > attacks, and make it easy to include other heuristics for other
> > potential attacks. When a potential attack is detected, users and
> > maintainers are notified (as necessary). There has been research and
> > development with this field with TorDoctor, exitmap, and
> > HoneyConnector. However, as far as I am aware, these projects could
> > use some help being solidified and integrated into TOR.
> 
> What do you mean by "solidified and integrated into TOR"?  Tor, the
> network or tor, the C program?  exitmap (and I think Doctor and
> HoneyConnector too) is meant to be a stand-alone tool that only uses
> the Tor network as a client.
> 
> And do you already have some concrete ideas about detecting anomalies?
> It's an interesting topic, but also a theory-heavy one.  If we don't
> have good ideas about concrete things to work on, we can easily spend
> all three months researching, which is not quite what TSoC is about.
> 
> While I'm currently working on Sybil attack detection [0], and more
> broadly anomaly detection, we are still mostly in the process of
> working out the theory.
> 
> There might be, however, ways to extend exitmap and add new modules to
> it, which is mostly programming.  The GitHub issue tracker lists two
> of them [1].
> 
> [0] <http://notebooks.nymity.ch/detecting_sybils.html>
> [1] <https://github.com/NullHypothesis/exitmap/issues>
> 
> Cheers,
> Philipp
> _______________________________________________
> tor-dev mailing list
> tor-dev@xxxxxxxxxxxxxxxxxxxx
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
> 

_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev