A Framework to TOR Network Traffic Analytics

Session

Computer Science and Communication Engineering

Description

Technology is evolving and penetrating rapidly into various domains of human life. As the number of small ubiquitous devices and web applications grows, privacy issues are becoming more and more sensitive. TOR is an application/browser that has been widely used to preserve online privacy. While it might gain some controversies, since it leaves lots of space for abuse, TOR remains one of the most successful anonymization tools available. This research aims to set and implement an experimental framework to TOR traffic analysis. The setup enables the investigation of various aspects of TOR utilization, e.g. if it is used more for web search anonymization or in non-interactive web, etc. A Raspberry Pi micro-computer was set to emulate the exit TOR routing node. Its traffic was also captured and stored in a PC. Popular traffic sniffing and analyzing applications, such as Wireshark, can be further used for various traffic classification and correlation. Based on the proposed experimental framework, the system has collected and stored the TOR traffic for two weeks and has shown its functionality and potential.

Keywords:

TOR, anonymity, privacy, Raspberry Pi, network traffic

Session Chair

Zhilbert Tafa

Session Co-Chair

Xhafer Krasniqi

Proceedings Editor

Edmond Hajrizi

ISBN

978-9951-437-96-7

Location

Lipjan, Kosovo

Start Date

31-10-2020 1:30 PM

End Date

31-10-2020 3:00 PM

DOI

10.33107/ubt-ic.2020.494

This document is currently not available here.

Share

COinS
 
Oct 31st, 1:30 PM Oct 31st, 3:00 PM

A Framework to TOR Network Traffic Analytics

Lipjan, Kosovo

Technology is evolving and penetrating rapidly into various domains of human life. As the number of small ubiquitous devices and web applications grows, privacy issues are becoming more and more sensitive. TOR is an application/browser that has been widely used to preserve online privacy. While it might gain some controversies, since it leaves lots of space for abuse, TOR remains one of the most successful anonymization tools available. This research aims to set and implement an experimental framework to TOR traffic analysis. The setup enables the investigation of various aspects of TOR utilization, e.g. if it is used more for web search anonymization or in non-interactive web, etc. A Raspberry Pi micro-computer was set to emulate the exit TOR routing node. Its traffic was also captured and stored in a PC. Popular traffic sniffing and analyzing applications, such as Wireshark, can be further used for various traffic classification and correlation. Based on the proposed experimental framework, the system has collected and stored the TOR traffic for two weeks and has shown its functionality and potential.