Documentation
¶
Overview ¶
Package main implements defector that runs two DefecTor attacks using:
the Wa-kNN website fingerprinting attack, and
a list of observed websites from a simulated Tor network.
For the Tor network simulation, given:
an estimate of the size of the Tor network,
a percentage of observed exit traffic by the attacker,
a website popularity distribution,
metrics for dns2site mapping, and
the starting Alexa rank of the monitored sites, we get a list of observed monitored sites in the DNS traffic from the Tor network. This simulated list is key the additional capability an attacker needs to launch DefecTor attacks beyond being in the position to launch a website fingerprinting attack. Our paper shows that, e.g., Google observes on average 33% of all DNS traffic from the Tor exits.