A Framework to TOR Network Traffic Analytics
Session
Computer Science and Communication Engineering
Description
Technology is evolving and penetrating rapidly into various domains of human life. As the number of small ubiquitous devices and web applications grows, privacy issues are becoming more and more sensitive. TOR is an application/browser that has been widely used to preserve online privacy. While it might gain some controversies, since it leaves lots of space for abuse, TOR remains one of the most successful anonymization tools available. This research aims to set and implement an experimental framework to TOR traffic analysis. The setup enables the investigation of various aspects of TOR utilization, e.g. if it is used more for web search anonymization or in non-interactive web, etc. A Raspberry Pi micro-computer was set to emulate the exit TOR routing node. Its traffic was also captured and stored in a PC. Popular traffic sniffing and analyzing applications, such as Wireshark, can be further used for various traffic classification and correlation. Based on the proposed experimental framework, the system has collected and stored the TOR traffic for two weeks and has shown its functionality and potential.
Keywords:
TOR, anonymity, privacy, Raspberry Pi, network traffic
Session Chair
Zhilbert Tafa
Session Co-Chair
Xhafer Krasniqi
Proceedings Editor
Edmond Hajrizi
ISBN
978-9951-437-96-7
Location
Lipjan, Kosovo
Start Date
31-10-2020 1:30 PM
End Date
31-10-2020 3:00 PM
DOI
10.33107/ubt-ic.2020.494
Recommended Citation
Qorolli, Agon and Tafa, Zhilbert, "A Framework to TOR Network Traffic Analytics" (2020). UBT International Conference. 300.
https://knowledgecenter.ubt-uni.net/conference/2020/all_events/300
A Framework to TOR Network Traffic Analytics
Lipjan, Kosovo
Technology is evolving and penetrating rapidly into various domains of human life. As the number of small ubiquitous devices and web applications grows, privacy issues are becoming more and more sensitive. TOR is an application/browser that has been widely used to preserve online privacy. While it might gain some controversies, since it leaves lots of space for abuse, TOR remains one of the most successful anonymization tools available. This research aims to set and implement an experimental framework to TOR traffic analysis. The setup enables the investigation of various aspects of TOR utilization, e.g. if it is used more for web search anonymization or in non-interactive web, etc. A Raspberry Pi micro-computer was set to emulate the exit TOR routing node. Its traffic was also captured and stored in a PC. Popular traffic sniffing and analyzing applications, such as Wireshark, can be further used for various traffic classification and correlation. Based on the proposed experimental framework, the system has collected and stored the TOR traffic for two weeks and has shown its functionality and potential.