Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
129 tokens/sec
GPT-4o
28 tokens/sec
Gemini 2.5 Pro Pro
42 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Peel the onion: Recognition of Android apps behind the Tor Network (1901.04434v1)

Published 14 Jan 2019 in cs.CR

Abstract: In this work we show that Tor is vulnerable to app deanonymization attacks on Android devices through network traffic analysis. For this purpose, we describe a general methodology for performing an attack that allows to deanonymize the apps running on a target smartphone using Tor, which is the victim of the attack. Then, we discuss a Proof-of-Concept, implementing the methodology, that shows how the attack can be performed in practice and allows to assess the deanonymization accuracy that it is possible to achieve. While attacks against Tor anonymity have been already gained considerable attention in the context of website fingerprinting in desktop environments, to the best of our knowledge this is the first work that highlights Tor vulnerability to apps deanonymization attacks on Android devices. In our experiments we achieved an accuracy of 97%.

Citations (9)

Summary

  • The paper demonstrates that Android apps using Tor are vulnerable to deanonymization through a two-phase, machine learning-based traffic analysis approach.
  • It extracts distinctive time metrics, packet directions, bursts, and sizes from network flows to create specific app traffic signatures.
  • Empirical evaluations using a Random Forest classifier achieve 97% accuracy, highlighting significant privacy risks for mobile users on Tor.

Overview of "Peel the onion: Recognition of Android apps behind the Tor Network"

The paper "Peel the onion: Recognition of Android apps behind the Tor Network," by Petagna et al., addresses a significant vulnerability of the Tor network when used on Android devices. The research demonstrates that Tor can be susceptible to application deanonymization through strategic traffic analysis, marking a novel investigation in this niche as previous work has predominantly focused on website fingerprinting in desktop environments.

Methodology and Results

The paper outlines a detailed methodology aimed at exposing Android applications running over the Tor network. This general methodology involves a two-phase process: a training phase and a deanonymization phase. During the training phase, a machine learning model is constructed using traffic data labeled by app type. The deanonymization phase involves applying this model to identify apps from live traffic data, captured as it egresses from the device to a network access point.

Central to this methodology is the use of network traffic analysis and machine learning, where a set of characteristic features are extracted from the traffic flows. These features include time-based metrics, packet direction, bursts, and sizes, which provide distinctive signatures for different applications.

In empirical evaluations, the methodology yields remarkable results, noting an accuracy of 97% when applying a Random Forest classifier and assessing the traffic under both reduced and full connection padding scenarios. This highlights the potential of this approach in dissecting app-specific traffic patterns across connections encrypted by Tor.

Implications and Future Directions

The findings hold significant implications for the security and privacy assumptions surrounding the use of Tor on mobile devices. While Tor aims to safeguard user anonymity, especially in environments conducive to passive network eavesdropping, this research reveals exploitable weaknesses. As smartphone apps often replace traditional web interactions, the ability to deanonymize these apps undermines user privacy when relying on Tor in mobile contexts.

From a theoretical standpoint, this work opens new avenues for understanding the weaknesses of anonymity networks in mobile app contexts. Practically, it suggests a need for heightened awareness and potentially new tactics or enhancements in Tor to bolster protections, possibly by mitigating discernible traffic signatures.

For future developments in AI and network security, this research encourages further exploration of adaptive adversarial models and sophisticated feature engineering to counteract network-based privacy breaches. The promise of leveraging machine learning in cyber defenses, specifically within distributed and decentralized network frameworks, holds potential to transform traditional paradigms of internet privacy.

In summary, "Peel the onion: Recognition of Android apps behind the Tor Network" offers a profound insight into the vulnerabilities of mobile anonymization practices and sets the stage for both enhanced academic inquiry and pragmatic advancements in privacy technologies. As smartphone usage continues to rise, the relevance of such research will likely grow, necessitating vigilant iterations of existing encryption and anonymization protocols to protect end-user privacy effectively.

Youtube Logo Streamline Icon: https://streamlinehq.com