By Topic

Onion routing for resistance to traffic analysis

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Syverson, P. ; Center for High Assurance Comput. Syst., Naval Res. Lab., Washington, DC, USA

Onion routing is a general purpose infrastructure for private communication over a widely shared network such as the Internet or the SIPRNET. It provides anonymous connections that are resistant to both eavesdropping and traffic analysis. The connections are bidirectional, near real-time, and can be used for both connection-based and connectionless traffic. Onion routing interfaces with off the shelf software and systems through specialized proxies, making it easy to integrate into existing systems. A proof-of-concept prototype for Web connections ran at NRL for about two years beginning in 1997, processing more than I million web connections per month from more than six thousand IP addresses in twenty countries and in all main top level domains. The program has been reimplemented from scratch. The resulting code base is only one third the size of the previous program but at the same time adds several resource management, efficiency, and attack resilience features, which are briefly described below. Onion routing can be used with applications that are proxy-aware, as well as several non-proxy-aware applications, without modification to the applications. Currently supported applications include those for Web browsing, email, IRC chat, and remote login (e.g., via SSH). We highlight some of the recent advances made in onion routing, followed by a description of how to use onion routing to make servers that are resistant both to denial of service and to physical threats. After that, we briefly describe some of the details of how onion routing works.

Published in:

DARPA Information Survivability Conference and Exposition, 2003. Proceedings  (Volume:2 )

Date of Conference:

22-24 April 2003