TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network

Zhuotao Liu, Yushan Liu, Philipp Winter, Prateek Mittal, Yih Chun Hu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Scopus citations

Abstract

Tor is the most widely used anonymity network, currently serving millions of users each day. However, there is no access control in place for all these users, leaving the network vulnerable to botnet abuse and attacks. For example, criminals frequently use exit relays as stepping stones for attacks, causing service providers to serve CAPTCHAs to exit relay IP addresses or blacklisting them altogether, which leads to severe usability issues for legitimate Tor users. To address this problem, we propose TorPolice, the first privacy-preserving access control framework for Tor. TorPolice enables abuse-plagued service providers such as Yelp to enforce access rules to police and throttle malicious requests coming from Tor while still providing service to legitimate Tor users. Further, TorPolice equips Tor with global access control for relays, enhancing Tor's resilience to botnet abuse. We show that TorPolice preserves the privacy of Tor users, implement a prototype of TorPolice, and perform extensive evaluations to validate our design goals.

Original languageEnglish (US)
Title of host publication2017 IEEE 25th International Conference on Network Protocols, ICNP 2017
PublisherIEEE Computer Society
ISBN (Electronic)9781509065011
DOIs
StatePublished - Nov 21 2017
Event25th IEEE International Conference on Network Protocols, ICNP 2017 - Toronto, Canada
Duration: Oct 10 2017Oct 13 2017

Publication series

NameProceedings - International Conference on Network Protocols, ICNP
Volume2017-October
ISSN (Print)1092-1648

Other

Other25th IEEE International Conference on Network Protocols, ICNP 2017
Country/TerritoryCanada
CityToronto
Period10/10/1710/13/17

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Software

Fingerprint

Dive into the research topics of 'TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network'. Together they form a unique fingerprint.

Cite this