Impact of replacing TCP by QUIC in Tor on website fingerprinting resistance

Master Thesis (2023)
Author(s)

C.H. Trap (TU Delft - Electrical Engineering, Mathematics and Computer Science)

Contributor(s)

Stefanie Roos – Mentor (TU Delft - Data-Intensive Systems)

Georgios Smaragdakis – Graduation committee member (TU Delft - Cyber Security)

J.E.A.P. Decouchant – Graduation committee member (TU Delft - Data-Intensive Systems)

Faculty
Electrical Engineering, Mathematics and Computer Science
Copyright
© 2023 Cyril Trap
More Info
expand_more
Publication Year
2023
Language
English
Copyright
© 2023 Cyril Trap
Graduation Date
24-07-2023
Awarding Institution
Delft University of Technology
Programme
['Computer Science | Cyber Security']
Faculty
Electrical Engineering, Mathematics and Computer Science
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Privacy is a human right, yet, people’s behavior on the web is constantly tracked. Tor, an anonymity network, is an effective defence against tracking. However, Tor’s multiplexing of logically independent data streams into a single TCP connection causes issues. Tor with QUIC has been implemented as an alternative with better performance but it has not been studied whether and by how much QUIC increases the vulnerability to timing-based attacks.
The most threatening attacks are website fingerprinting attacks, which can track a Tor user by only controlling the guard node, first of the relays that forward traffic in Tor. In this work, Tor with QUIC is evaluated against website fingerprinting attacks with various levels of defences active. Without defences, Tor is vulnerable to website fingerprinting for both TCP and QUIC but the attacks are more effective on QUIC. On the positive side, defences against website fingerprinting remain effective for QUIC in that they decrease the effectiveness of the attack by a
similar fraction as for TCP.

Files

Thesis.pdf
(pdf | 1.76 Mb)
License info not available