Damian Johnson commited on 2017-02-05 01:07:06
Zeige 1 geänderte Dateien mit 0 Einfügungen und 40 Löschungen.
Didn't hear back if it was still relevant.
| ... | ... |
@@ -1104,46 +1104,6 @@ ideas. |
| 1104 | 1104 |
</ul> |
| 1105 | 1105 |
</li> |
| 1106 | 1106 |
|
| 1107 |
- <a id="ipHijacking"></a> |
|
| 1108 |
- <li> |
|
| 1109 |
- <b>IP hijacking detection for the Tor Network</b> |
|
| 1110 |
- <br> |
|
| 1111 |
- Likely Mentors: <i>Aaron Gibson (aagbsn)</i> |
|
| 1112 |
- <br><br> |
|
| 1113 |
- <p> |
|
| 1114 |
- <a href="https://en.wikipedia.org/wiki/IP_hijacking">IP hijacking</a> |
|
| 1115 |
- occurs when a bad actor creates false routing information to redirect |
|
| 1116 |
- Internet traffic to or through themselves. This activity is straightforward |
|
| 1117 |
- to detect, because the Internet routing tables are public information, but |
|
| 1118 |
- currently there are no public services that monitor the Tor network. The |
|
| 1119 |
- Tor Network is a dynamic set of relays, so monitoring must be Tor-aware in |
|
| 1120 |
- order to keep the set of monitored relays accurate. Additionally, consensus |
|
| 1121 |
- archives and historical Internet routing table snapshots are publicly |
|
| 1122 |
- available, and this analysis can be performed retroactively. |
|
| 1123 |
- </p> |
|
| 1124 |
- |
|
| 1125 |
- <p> |
|
| 1126 |
- The implications of IP hijacking are that Tor traffic can be redirected |
|
| 1127 |
- through a network that an attacker controls, even if the attacker does not |
|
| 1128 |
- normally have this capability - i.e. they are not in the network path. For |
|
| 1129 |
- example, an adversary could hijack the prefix of a Tor Guard relay, in |
|
| 1130 |
- order to learn who its clients are, or hijack a Tor Exit relay to tamper |
|
| 1131 |
- with requests or name resolution. |
|
| 1132 |
- </p> |
|
| 1133 |
- |
|
| 1134 |
- <p> |
|
| 1135 |
- This project comprises building a service that compares network prefixes of |
|
| 1136 |
- relays in the consensus with present and historic routing table snapshots |
|
| 1137 |
- from looking glass services such as <a |
|
| 1138 |
- href="http://routeviews.org">Routeviews</a>, or aggregators such as <a |
|
| 1139 |
- href="https://bgpstream.caida.org">Caida BGPStream</a> and then issues |
|
| 1140 |
- email alerts to the contact-info in the relay descriptor and a mailing |
|
| 1141 |
- list. Network operators are responsive to route injections, and these |
|
| 1142 |
- alerts can be used to notify network operators to take immediate action, as |
|
| 1143 |
- well as collect information about the occurrence of these type of attacks. |
|
| 1144 |
- </p> |
|
| 1145 |
- </li> |
|
| 1146 |
- |
|
| 1147 | 1107 |
<a id="ahmiaSearch"></a> |
| 1148 | 1108 |
<li> |
| 1149 | 1109 |
<b>Ahmia - Hidden Service Search</b> |
| 1150 | 1110 |