AAU Student Projects - visit Aalborg University's student projects portal
A master's thesis from Aalborg University
Book cover


Towards De-anonymizing Hidden Services

Author

Term

4. semester

Publication year

2023

Submitted on

Abstract

This thesis examines whether and how Tor hidden services (THS) can be de-anonymized, focusing on the challenges and limitations imposed by the Tor network’s design. It asks which de-anonymization techniques exist, how THS operate in practice, how current methods compare in applicability and robustness, and how they might be improved. The work follows a two-part approach: (1) a comparative literature review of recent research, selected for relevance, recency, and citation strength, in which 20 publications are analyzed and rated by cost/feasibility and expected impact; and (2) a practical conceptualization, design, and scoping of an attack that relies on monitoring watermarked packets at a target’s compromised guard relay to correlate traffic. The thesis explains how Tor’s uniform cell size and layered encryption make traffic features hard to distinguish, underscoring the robustness of Tor’s privacy protections. Based on the presented material, it emphasizes the difficulties of de-anonymizing THS, provides a structured evaluation framework for known attack vectors, and outlines a guard-based traffic watermarking proof-of-concept, discussing implications and future work without claiming specific performance results beyond highlighting the limitations.

Dette speciale undersøger, hvorvidt og hvordan Tor-skjulte tjenester (THS) kan deanonymiseres, med fokus på de udfordringer og begrænsninger, Tor-netværkets design skaber. Projektet stiller spørgsmålet: hvilke metoder findes der til at deanonymisere THS, hvordan fungerer THS i praksis, hvordan står eksisterende metoder mål i anvendelighed og robusthed, og hvordan kan de forbedres? Arbejdet følger en todelt tilgang: (1) en komparativ litteraturgennemgang af nyere forskning, udvalgt efter relevans, aktualitet og citeringstæthed, hvor 20 publikationer analyseres og sammenlignes på omkostning/feasibilitet og forventet påvirkning; og (2) en praktisk konceptualisering, design og afgrænsning af et angreb, der afhænger af at overvåge vandmærkede pakker ved målets kompromitterede guard-relæ for at korrelere trafik. Specialet forklarer Tor-cellers ensartede størrelse og lagdelte kryptering som centrale årsager til, at trafikaftryk er svære at skelne, og fremhæver dermed robustheden i Tors privatlivsmekanismer. Ud fra det fremlagte understreger specialet især vanskelighederne ved deanonymisering af THS, opstiller en systematisk evalueringsramme for kendte angrebsvektorer og skitserer et proof‑of‑concept for guard‑baseret trafikvandmærkning, samt diskuterer implikationer og fremtidigt arbejde, uden at hævde konkrete effektmålinger ud over at betone begrænsningerne.

[This apstract has been generated with the help of AI directly from the project full text]