Visible to the public TorWard: Discovery of malicious traffic over Tor

TitleTorWard: Discovery of malicious traffic over Tor
Publication TypeConference Paper
Year of Publication2014
AuthorsZhen Ling, Junzhou Luo, Kui Wu, Wei Yu, Xinwen Fu
Conference NameINFOCOM, 2014 Proceedings IEEE
Date PublishedApril
KeywordsBandwidth, computer network security, Computers, denial-of-service attack traffic, DoS, IDS, IDS alerts, intrusion detection system, Logic gates, low-latency anonymous communication system, Malicious Traffic, malicious traffic categorization, malicious traffic discovery, Malware, Mobile handsets, P2P traffic, Peer-to-peer computing, Ports (Computers), Servers, spam, telecommunication network routing, telecommunication traffic, Tor, Tor exit routers
Abstract

Tor is a popular low-latency anonymous communication system. However, it is currently abused in various ways. Tor exit routers are frequently troubled by administrative and legal complaints. To gain an insight into such abuse, we design and implement a novel system, TorWard, for the discovery and systematic study of malicious traffic over Tor. The system can avoid legal and administrative complaints and allows the investigation to be performed in a sensitive environment such as a university campus. An IDS (Intrusion Detection System) is used to discover and classify malicious traffic. We performed comprehensive analysis and extensive real-world experiments to validate the feasibility and effectiveness of TorWard. Our data shows that around 10% Tor traffic can trigger IDS alerts. Malicious traffic includes P2P traffic, malware traffic (e.g., botnet traffic), DoS (Denial-of-Service) attack traffic, spam, and others. Around 200 known malware have been identified. To the best of our knowledge, we are the first to perform malicious traffic categorization over Tor.

DOI10.1109/INFOCOM.2014.6848074
Citation Key6848074