defector

command
v0.0.0-...-496f71c Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Dec 10, 2021 License: GPL-3.0 Imports: 13 Imported by: 0

Documentation

Overview

Package main implements defector that runs two DefecTor attacks using:

  • the Wa-kNN website fingerprinting attack, and

  • a list of observed websites from a simulated Tor network.

    For the Tor network simulation, given:

  • an estimate of the size of the Tor network,

  • a percentage of observed exit traffic by the attacker,

  • a website popularity distribution,

  • metrics for dns2site mapping, and

  • the starting Alexa rank of the monitored sites, we get a list of observed monitored sites in the DNS traffic from the Tor network. This simulated list is key the additional capability an attacker needs to launch DefecTor attacks beyond being in the position to launch a website fingerprinting attack. Our paper shows that, e.g., Google observes on average 33% of all DNS traffic from the Tor exits.

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL