pith. sign in

arxiv: 1708.08162 · v3 · pith:RLSJA6IWnew · submitted 2017-08-28 · 💻 cs.CR

TorPolice: Towards Enforcing Service-Defined Access Policies in Anonymous Systems

classification 💻 cs.CR
keywords torpoliceaccessuserscontrolserviceabuseattacksbotnet
0
0 comments X
read the original abstract

Tor is the most widely used anonymity network, currently serving millions of users each day. However, there is no access control in place for all these users, leaving the network vulnerable to botnet abuse and attacks. For example, criminals frequently use exit relays as stepping stones for attacks, causing service providers to serve CAPTCHAs to exit relay IP addresses or blacklisting them altogether, which leads to severe usability issues for legitimate Tor users. To address this problem, we propose TorPolice, the first privacy-preserving access control framework for Tor. TorPolice enables abuse-plagued service providers such as Yelp to enforce access rules to police and throttle malicious requests coming from Tor while still providing service to legitimate Tor users. Further, TorPolice equips Tor with global access control for relays, enhancing Tor's resilience to botnet abuse. We show that TorPolice preserves the privacy of Tor users, implement a prototype of TorPolice, and perform extensive evaluations to validate our design goals.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 1 Pith paper

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. A traffic analysis attack against Introduction Protocol and Onion Services

    cs.CR 2026-02 conditional novelty 6.0

    A practical intersection attack identifies each hop toward a Tor onion service using single-relay observations and repeated probe intersections within INTRODUCE1-RENDEZVOUS2 intervals.