MUFFLER: Secure Tor Traffic Obfuscation with Dynamic Connection Shuffling and Splitting

πŸ“… 2025-04-10
πŸ“ˆ Citations: 0
✨ Influential: 0
πŸ“„ PDF
πŸ€– AI Summary
Tor is vulnerable to traffic correlation attacks; existing defenses suffer from high overhead and insufficient dynamic obfuscation at the exit relay. This paper proposes a connection-level dynamic obfuscation mechanism that, without active padding or artificial delay injection, virtualizes connections and employs network-state-aware dynamic mapping to real-time transform actual connections into perturbed virtual onesβ€”fully decoupling ingress and egress traffic patterns. Crucially, it achieves the first adaptive, real-time perturbation of exit traffic patterns while maintaining full compatibility with the current Tor protocol stack. Experimental evaluation demonstrates a dramatic reduction in correlation attack detection rate to 1% (false positive rate = 10⁻²), with only 2.17% bandwidth overhead and end-to-end latency reduced to 1/27 of the state-of-the-art solution.

Technology Category

Application Category

πŸ“ Abstract
Tor, a widely utilized privacy network, enables anonymous communication but is vulnerable to flow correlation attacks that deanonymize users by correlating traffic patterns from Tor's ingress and egress segments. Various defenses have been developed to mitigate these attacks; however, they have two critical limitations: (i) significant network overhead during obfuscation and (ii) a lack of dynamic obfuscation for egress segments, exposing traffic patterns to adversaries. In response, we introduce MUFFLER, a novel connection-level traffic obfuscation system designed to secure Tor egress traffic. It dynamically maps real connections to a distinct set of virtual connections between the final Tor nodes and targeted services, either public or hidden. This approach creates egress traffic patterns fundamentally different from those at ingress segments without adding intentional padding bytes or timing delays. The mapping of real and virtual connections is adjusted in real-time based on ongoing network conditions, thwarting adversaries' efforts to detect egress traffic patterns. Extensive evaluations show that MUFFLER mitigates powerful correlation attacks with a TPR of 1% at an FPR of 10^-2 while imposing only a 2.17% bandwidth overhead. Moreover, it achieves up to 27x lower latency overhead than existing solutions and seamlessly integrates with the current Tor architecture.
Problem

Research questions and friction points this paper is trying to address.

Mitigates flow correlation attacks on Tor network
Reduces network overhead during traffic obfuscation
Enables dynamic obfuscation for Tor egress traffic
Innovation

Methods, ideas, or system contributions that make the work stand out.

Dynamic connection shuffling and splitting
Real-time virtual connection mapping
Minimal bandwidth and latency overhead
πŸ”Ž Similar Papers
No similar papers found.
Minjae Seo
Minjae Seo
KAIST
AI SecurityNetwork Security
Myoungsung You
Myoungsung You
Assistant Professor at University of Seoul
Programmable data planeCloud computingConfidential computingSystem security
J
Jaehan Kim
School of Electrical Engineering, KAIST, Daejeon, Republic of Korea
Taejune Park
Taejune Park
Chonnam National University
System and Network SecurityCloud Computing
S
Seungwon Shin
School of Electrical Engineering, KAIST, Daejeon, Republic of Korea
J
Jinwoo Kim
School of Software, Kwangwoon University, Seoul, Republic of Korea