On 11/13/14, IGNACIO GAGO PADRENY <[email protected]> wrote: > ... > I am currently studying network security and I am focusing on defense > against DDoS attacks in Tor. I have read a few papers (replay attack, > sniper attack, etc.) but most of them are not recent.
i assume you looked over http://freehaven.net/anonbib as well. > My aim is to develop > (theoretically or in practice) a defense but I would really appreciate if > you could tell me current attacks which have no defense or are the most > successful ones. DoS are all "successful", by some measure. ordered by hardness, consider: 0. application level, like slowloris or computational DoS. [ see torhs-pyloris-nov9.tgz on #8902 ] 1. hidden services in general, roles like HSDir or Rendz., high connection rates, stream isolation impacts. [ see list at https://blog.torproject.org/blog/thoughts-and-concerns-about-operation-onymous for enumeration of many known attacks ] 2. protocol issues, circuit extension attacks, shared gateways manipulation, predecessor attacks, etc. 3. high capacity relay performance issues, tuning, clogging, etc. messing with the fast relays most difficult. from there, considerably easier to deny service. a hard problem. good luck! :) ( most don't even try to fix 0 or 1 at all... ) best regards, -- tor-talk mailing list - [email protected] To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
