Users' anonymity and privacy are among the major concerns of today's Internet. Anonymizing networks are then poised to become an important service to support anonymous-driven Internet communications and consequently enhance users' privacy protection. Indeed, Tor an example of anonymizing networks based on onion routing concept attracts more and more volunteers, and is now popular among dozens of thousands of Internet users. Surprisingly, very few researches shed light on such an anonymizing network. Beyond providing global statistics on the typical usage of Tor in the wild, we show that Tor is actually being is-used, as most of the observed traffic belongs to P2P applications. In particular, we quantify the BitTorrent traffic and show that the load of the latter on the Tor network is underestimated because of encrypted BitTorrent traffic (that can go unnoticed). Furthermore, this paper provides a deep analysis of both the HTTP and BitTorrent protocols giving a complete overview of their usage. We do not only report such usage in terms of traffic size and number of connections but also depict how users behave on top of Tor. We also show that Tor usage is now diverted from the onion routing concept and that Tor exit nodes are frequently used as 1-hop SOCKS proxies, through a so-called tunneling technique. We provide an efficient method allowing an exit node to detect such an abnormal usage. Finally, we report our experience in effectively crawling bridge nodes, supposedly revealed sparingly in Tor.
[1]
Roger Dingledine,et al.
A Case Study on Measuring Statistical Data in the Tor Anonymity Network
,
2010,
Financial Cryptography Workshops.
[2]
Nick Mathewson,et al.
Tor: The Second-Generation Onion Router
,
2004,
USENIX Security Symposium.
[3]
Anja Feldmann,et al.
On dominant characteristics of residential broadband internet traffic
,
2009,
IMC '09.
[4]
Dirk Grunwald,et al.
Shining Light in Dark Places: Understanding the Tor Network
,
2008,
Privacy Enhancing Technologies.
[5]
David Chaum,et al.
Untraceable electronic mail, return addresses, and digital pseudonyms
,
1981,
CACM.
[6]
Keith W. Ross,et al.
BitTorrent Darknets
,
2010,
2010 Proceedings IEEE INFOCOM.
[7]
Walid Dabbous,et al.
Compromising Tor Anonymity Exploiting P2P Information Leakage
,
2010,
ArXiv.