Opened 7 years ago

Closed 6 years ago

Last modified 6 years ago

#7026 closed defect (fixed)

Adversary-based metrics

Reported by: amj703 Owned by:
Priority: Medium Milestone:
Component: Metrics/Analysis Version:
Severity: Keywords:
Cc: gsathya, arma Actual Points:
Parent ID: #6460 Points:
Reviewer: Sponsor:


I'd like to evaluate on Tor security metrics that are based on adversary models. Some adversary models to consider are

  1. An adversary that can compromise k relays.
  2. An adversary that can contribute b bandwidth.
  3. An adversary that can observe k Autonomous Systems.

The security metrics for Tor based on these models that are relevant to Tor include

  1. The probability that the adversary observes the entry and exit traffic of a given connection.
  2. The probability distribution of the number of connections of a user for which the adversary observes entry and exit traffic (guard selection is particularly important here).
  3. The "linkability" of different connections.

Child Tickets

Change History (2)

comment:1 Changed 6 years ago by amj703

Resolution: fixed
Status: newclosed

comment:2 Changed 6 years ago by amj703

Such metrics have been defined and evaluated in the paper "Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries", appearing in ACM CCS 2013

Note: See TracTickets for help on using tickets.