Print Email Facebook Twitter Impact of replacing TCP by QUIC in Tor on website fingerprinting resistance Title Impact of replacing TCP by QUIC in Tor on website fingerprinting resistance Author Trap, Cyril (TU Delft Electrical Engineering, Mathematics and Computer Science; TU Delft Cyber Security; TU Delft Distributed Systems) Contributor Roos, S. (mentor) Smaragdakis, G. (graduation committee) Decouchant, Jérémie (graduation committee) Degree granting institution Delft University of Technology Programme Computer Science | Cyber Security Date 2023-07-24 Abstract Privacy is a human right, yet, people’s behavior on the web is constantly tracked. Tor, an anonymity network, is an effective defence against tracking. However, Tor’s multiplexing of logically independent data streams into a single TCP connection causes issues. Tor with QUIC has been implemented as an alternative with better performance but it has not been studied whether and by how much QUIC increases the vulnerability to timing-based attacks.The most threatening attacks are website fingerprinting attacks, which can track a Tor user by only controlling the guard node, first of the relays that forward traffic in Tor. In this work, Tor with QUIC is evaluated against website fingerprinting attacks with various levels of defences active. Without defences, Tor is vulnerable to website fingerprinting for both TCP and QUIC but the attacks are more effective on QUIC. On the positive side, defences against website fingerprinting remain effective for QUIC in that they decrease the effectiveness of the attack by asimilar fraction as for TCP. Subject TorQUICanonymityprivacyfingerprintingmachine learningnetwork traffic analysisanonymous communication To reference this document use: http://resolver.tudelft.nl/uuid:aae440ca-a787-4f61-8730-67a1d3cdd508 Part of collection Student theses Document type master thesis Rights © 2023 Cyril Trap Files PDF Thesis.pdf 1.76 MB Close viewer /islandora/object/uuid:aae440ca-a787-4f61-8730-67a1d3cdd508/datastream/OBJ/view