TorWard: Discovery of malicious traffic over Tor
Title | TorWard: Discovery of malicious traffic over Tor |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Zhen Ling, Junzhou Luo, Kui Wu, Wei Yu, Xinwen Fu |
Conference Name | INFOCOM, 2014 Proceedings IEEE |
Date Published | April |
Keywords | Bandwidth, computer network security, Computers, denial-of-service attack traffic, DoS, IDS, IDS alerts, intrusion detection system, Logic gates, low-latency anonymous communication system, Malicious Traffic, malicious traffic categorization, malicious traffic discovery, Malware, Mobile handsets, P2P traffic, Peer-to-peer computing, Ports (Computers), Servers, spam, telecommunication network routing, telecommunication traffic, Tor, Tor exit routers |
Abstract | Tor is a popular low-latency anonymous communication system. However, it is currently abused in various ways. Tor exit routers are frequently troubled by administrative and legal complaints. To gain an insight into such abuse, we design and implement a novel system, TorWard, for the discovery and systematic study of malicious traffic over Tor. The system can avoid legal and administrative complaints and allows the investigation to be performed in a sensitive environment such as a university campus. An IDS (Intrusion Detection System) is used to discover and classify malicious traffic. We performed comprehensive analysis and extensive real-world experiments to validate the feasibility and effectiveness of TorWard. Our data shows that around 10% Tor traffic can trigger IDS alerts. Malicious traffic includes P2P traffic, malware traffic (e.g., botnet traffic), DoS (Denial-of-Service) attack traffic, spam, and others. Around 200 known malware have been identified. To the best of our knowledge, we are the first to perform malicious traffic categorization over Tor. |
DOI | 10.1109/INFOCOM.2014.6848074 |
Citation Key | 6848074 |
- malicious traffic discovery
- Tor exit routers
- Tor
- telecommunication traffic
- telecommunication network routing
- spam
- Servers
- Ports (Computers)
- Peer-to-peer computing
- P2P traffic
- Mobile handsets
- malware
- Bandwidth
- malicious traffic categorization
- Malicious Traffic
- low-latency anonymous communication system
- Logic gates
- intrusion detection system
- IDS alerts
- IDS
- DoS
- denial-of-service attack traffic
- Computers
- computer network security