Shining light in dark places: Understanding the tor network

Damon McCoy, Kevin Bauer, Dirk Grunwald, Tadayoshi Kohno, Douglas Sicker

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    To date, there has yet to be a study that characterizes the usage of a real deployed anonymity service. We present observations and analysis obtained by participating in the Tor network. Our primary goals are to better understand Tor as it is deployed and through this understanding, propose improvements. In particular, we are interested in answering the following questions: (1) How is Tor being used? (2) How is Tor being mis-used? (3) Who is using Tor? To sample the results, we show that web traffic makes up the majority of the connections and bandwidth, but non-interactive protocols consume a disproportionately large amount of bandwidth when compared to interactive protocols. We provide a survey of how Tor is being misused, both by clients and by Tor router operators. In particular, we develop a method for detecting exit router logging (in certain cases). Finally, we present evidence that Tor is used throughout the world, but router participation is limited to only a few countries.

    Original languageEnglish (US)
    Title of host publicationPrivacy Enhancing Technologies - 8th International Symposium, PETS 2008, Proceedings
    Pages63-76
    Number of pages14
    Volume5134 LNCS
    DOIs
    StatePublished - 2008
    Event8th Privacy Enhancing Technologies Symposium, PETS 2008 - Leuven, Belgium
    Duration: Jul 23 2008Jul 25 2008

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume5134 LNCS
    ISSN (Print)03029743
    ISSN (Electronic)16113349

    Other

    Other8th Privacy Enhancing Technologies Symposium, PETS 2008
    CountryBelgium
    CityLeuven
    Period7/23/087/25/08

    Fingerprint

    Router
    Routers
    Bandwidth
    Anonymity
    Traffic
    Operator
    Surveys and Questionnaires

    ASJC Scopus subject areas

    • Computer Science(all)
    • Biochemistry, Genetics and Molecular Biology(all)
    • Theoretical Computer Science

    Cite this

    McCoy, D., Bauer, K., Grunwald, D., Kohno, T., & Sicker, D. (2008). Shining light in dark places: Understanding the tor network. In Privacy Enhancing Technologies - 8th International Symposium, PETS 2008, Proceedings (Vol. 5134 LNCS, pp. 63-76). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5134 LNCS). https://doi.org/10.1007/978-3-540-70630-4_5

    Shining light in dark places : Understanding the tor network. / McCoy, Damon; Bauer, Kevin; Grunwald, Dirk; Kohno, Tadayoshi; Sicker, Douglas.

    Privacy Enhancing Technologies - 8th International Symposium, PETS 2008, Proceedings. Vol. 5134 LNCS 2008. p. 63-76 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5134 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    McCoy, D, Bauer, K, Grunwald, D, Kohno, T & Sicker, D 2008, Shining light in dark places: Understanding the tor network. in Privacy Enhancing Technologies - 8th International Symposium, PETS 2008, Proceedings. vol. 5134 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 5134 LNCS, pp. 63-76, 8th Privacy Enhancing Technologies Symposium, PETS 2008, Leuven, Belgium, 7/23/08. https://doi.org/10.1007/978-3-540-70630-4_5
    McCoy D, Bauer K, Grunwald D, Kohno T, Sicker D. Shining light in dark places: Understanding the tor network. In Privacy Enhancing Technologies - 8th International Symposium, PETS 2008, Proceedings. Vol. 5134 LNCS. 2008. p. 63-76. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-540-70630-4_5
    McCoy, Damon ; Bauer, Kevin ; Grunwald, Dirk ; Kohno, Tadayoshi ; Sicker, Douglas. / Shining light in dark places : Understanding the tor network. Privacy Enhancing Technologies - 8th International Symposium, PETS 2008, Proceedings. Vol. 5134 LNCS 2008. pp. 63-76 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
    @inproceedings{b825991770b64b30b9eec6449487058e,
    title = "Shining light in dark places: Understanding the tor network",
    abstract = "To date, there has yet to be a study that characterizes the usage of a real deployed anonymity service. We present observations and analysis obtained by participating in the Tor network. Our primary goals are to better understand Tor as it is deployed and through this understanding, propose improvements. In particular, we are interested in answering the following questions: (1) How is Tor being used? (2) How is Tor being mis-used? (3) Who is using Tor? To sample the results, we show that web traffic makes up the majority of the connections and bandwidth, but non-interactive protocols consume a disproportionately large amount of bandwidth when compared to interactive protocols. We provide a survey of how Tor is being misused, both by clients and by Tor router operators. In particular, we develop a method for detecting exit router logging (in certain cases). Finally, we present evidence that Tor is used throughout the world, but router participation is limited to only a few countries.",
    author = "Damon McCoy and Kevin Bauer and Dirk Grunwald and Tadayoshi Kohno and Douglas Sicker",
    year = "2008",
    doi = "10.1007/978-3-540-70630-4_5",
    language = "English (US)",
    isbn = "3540706291",
    volume = "5134 LNCS",
    series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
    pages = "63--76",
    booktitle = "Privacy Enhancing Technologies - 8th International Symposium, PETS 2008, Proceedings",

    }

    TY - GEN

    T1 - Shining light in dark places

    T2 - Understanding the tor network

    AU - McCoy, Damon

    AU - Bauer, Kevin

    AU - Grunwald, Dirk

    AU - Kohno, Tadayoshi

    AU - Sicker, Douglas

    PY - 2008

    Y1 - 2008

    N2 - To date, there has yet to be a study that characterizes the usage of a real deployed anonymity service. We present observations and analysis obtained by participating in the Tor network. Our primary goals are to better understand Tor as it is deployed and through this understanding, propose improvements. In particular, we are interested in answering the following questions: (1) How is Tor being used? (2) How is Tor being mis-used? (3) Who is using Tor? To sample the results, we show that web traffic makes up the majority of the connections and bandwidth, but non-interactive protocols consume a disproportionately large amount of bandwidth when compared to interactive protocols. We provide a survey of how Tor is being misused, both by clients and by Tor router operators. In particular, we develop a method for detecting exit router logging (in certain cases). Finally, we present evidence that Tor is used throughout the world, but router participation is limited to only a few countries.

    AB - To date, there has yet to be a study that characterizes the usage of a real deployed anonymity service. We present observations and analysis obtained by participating in the Tor network. Our primary goals are to better understand Tor as it is deployed and through this understanding, propose improvements. In particular, we are interested in answering the following questions: (1) How is Tor being used? (2) How is Tor being mis-used? (3) Who is using Tor? To sample the results, we show that web traffic makes up the majority of the connections and bandwidth, but non-interactive protocols consume a disproportionately large amount of bandwidth when compared to interactive protocols. We provide a survey of how Tor is being misused, both by clients and by Tor router operators. In particular, we develop a method for detecting exit router logging (in certain cases). Finally, we present evidence that Tor is used throughout the world, but router participation is limited to only a few countries.

    UR - http://www.scopus.com/inward/record.url?scp=50249133191&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=50249133191&partnerID=8YFLogxK

    U2 - 10.1007/978-3-540-70630-4_5

    DO - 10.1007/978-3-540-70630-4_5

    M3 - Conference contribution

    AN - SCOPUS:50249133191

    SN - 3540706291

    SN - 9783540706298

    VL - 5134 LNCS

    T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

    SP - 63

    EP - 76

    BT - Privacy Enhancing Technologies - 8th International Symposium, PETS 2008, Proceedings

    ER -