@article { author = {Tavakoly, A. and Ebrahimi Atani, R.}, title = {Improving Tor security against timing and traffic analysis attacks with fair randomization}, journal = {The ISC International Journal of Information Security}, volume = {6}, number = {1}, pages = {67-76}, year = {2014}, publisher = {Iranian Society of Cryptology}, issn = {2008-2045}, eissn = {2008-3076}, doi = {10.22042/isecure.2014.6.1.6}, abstract = {The Tor network is probably one of the most popular online anonymity systems in the world. It has been built based on the volunteer relays from all around the world. It has a strong scientific basis which is structured very well to work in low latency mode that makes it suitable for tasks such as web browsing. Despite the advantages, the low latency also makes Tor insecure against timing and traffic analysis attacks, which are the most dominant attacks on Tor network in recent past years. In this paper, first all kinds of attacks on Tor network will be classified and then timing and traffic analysis attacks will be described in more details. Then we present a new circuit scheduling for Tor network in order to preserve two properties, fairness and randomness. Both properties are trying to make pattern and timing analysis attacks more difficult and even in some cases impractical. Our scheduler distorts timing patterns and size of packets in a random way (randomness) without imposing artificial delays or paddings (fairness). Finally, by using our new scheduler, one of the most powerful attacks in this area is debilitated, and by it is shown that analyzing traffic patterns and size of packets will be more difficult to manage.}, keywords = {Anonymity,Fairness,Randomness,Timing Attacks,Tor,Traffic analysis}, url = {https://www.isecure-journal.com/article_39152.html}, eprint = {https://www.isecure-journal.com/article_39152_73eba4f532b134c81e3d2a49623473c6.pdf} }