gPath: A game-theoretic path selection algorithm to protect Tor's anonymity

Nan Zhang, Wei Yu, Xinwen Fu, Sajal K. Das

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Abstract

In this paper, we address the problem of defending against entry-exit linking attacks in Tor, a popular anonymous communication system. We formalize the problem as a repeated non-cooperative game between the defender and the adversary (i.e., controller of the compromised Tor nodes to carry out entry-exit linking attacks). Given the current path selection algorithm of Tor, we derive an optimal attack strategy for the adversary according to its utility function, followed by an optimal defensive strategy against this attack. We then repeat such interactions for three additional times, leading to three design principles, namely stratified path selection, bandwidth order selection, and adaptive exit selection. We further develop gPath, a path selection algorithm that integrates all three principles to significantly reduce the success probability of linking attacks. Using a combination of theoretical analysis and experimental studies on real-world Tor data, we demonstrate the superiority of our algorithm over the existing ones.

Original languageEnglish (US)
Title of host publicationDecision and Game Theory for Security - First International Conference, GameSec 2010, Proceedings
Pages58-71
Number of pages14
DOIs
StatePublished - Dec 1 2010
Event1st International Conference on Decision and Game Theory for Security, GameSec 2010 - Berlin, Germany
Duration: Nov 22 2010Nov 23 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6442 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other1st International Conference on Decision and Game Theory for Security, GameSec 2010
CountryGermany
CityBerlin
Period11/22/1011/23/10

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'gPath: A game-theoretic path selection algorithm to protect Tor's anonymity'. Together they form a unique fingerprint.

  • Cite this

    Zhang, N., Yu, W., Fu, X., & Das, S. K. (2010). gPath: A game-theoretic path selection algorithm to protect Tor's anonymity. In Decision and Game Theory for Security - First International Conference, GameSec 2010, Proceedings (pp. 58-71). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 6442 LNCS). https://doi.org/10.1007/978-3-642-17197-0_4