top targets are typically large network/hosting
providers, which are probably willing to assist if
approached correctly (e.g. with judicial orders). Still,
a significant share of traffic is extremely distributed,
and especially for smaller providers the necessary
knowledge, resources, and willingness might be
limited. So if attacks were detected automatically,
notifying targets would result in a perceptible
burden, as many organizations need to be contacted.
If data from an “exit” (=uplink) of a normal
small/medium-size ISP were available, a comparison
to ordinary traffic would become possible. In this
way it could perhaps be (dis-)proven that Tor exit
traffic closely resembles normal traffic and therefore
does not pose a special danger of illegal use.
A large share of traffic could be unencrypted
(HTTP), but without content investigation this
cannot be guaranteed and remains a task for further
investigation - including deep packet inspection, if
associated privacy&legal issues can be solved. Still
a significant part, (presumably) about one third, is
encrypted, and direct content investigation is
impossible. While definitively (apart from probably
– see above) unencrypted traffic is only a tiny part,
this still amounts to a significant amount of data,
posing notable risk if a fraudulent exit node were
involved.
Some traffic we see on our exit node appears
strange already from the outer metadata. While it
might be useful to ask for the owner of a domain
anonymously, e.g. when considering to buy it, this
cannot explain the large number of WhoIs requests.
Similarly, part of the SSH traffic is suspicious:
While using it to connect to a server does not grant
anonymity against this server but only anyone
observing the traffic, the tiny average connection
size hints at brute-force password cracking.
ACKNOWLEDGEMENTS
We would like to thank both the Johannes Kepler
University Linz as well as the AcoNet for supporting
this project by granting permission and providing
necessary bandwidth. We also thank Heinrich
Schmitzberger for patching the Tor source code to
enable marking exit traffic for correct monitoring.
REFERENCES
asn, Some statistics about onions, [online] Available at:
https://blog.torproject.org/blog/some-statistics-about-
onions [Accessed 21.9.2016]
Ailanthus. 2015. Ethical Tor research: Guidelines, [online]
https://blog.torproject.org/blog/ethical-tor-research-
guidelines [Accessed 21.9.2016]
Akamai, 2015. akamai’s [state of the internet] / security
Q2 2015 report, [online] https://www.akamai.com/uk/
en/multimedia/documents/state-of-the-internet/2015-
q2-cloud-security-report.pdf [Accessed 21.9.2016]
Biryukov, A., Pustogarov, I., Thill, F, and Weinmann, R.-
P. 2014. Content and Popularity Analysis of Tor
Hidden Services, ICDCS Workshops 2014, 188-193
Callahan, T., Allman, M., and Paxson, V. 2010. A
longitudinal view of HTTP traffic. Proceedings of the
11th international conference on Passive and active
measurement (PAM'10), Springer-Verlag, 222-231.
Chaabane, A., Manils, P., and Kaafar, M.2010. Digging
into anonymous traffic: A deep analysis of the Tor
anonymizing network, Proceedings of the 4th
International Conference on Network and System
Security (NSS), 2010, 167–174.
INS, 2016. Tor system setup, [online] Available at
https://www.ins.tor.net.eu.org/tor-info/index.html
[Accessed 21.9.2016]
Jansen, R., Johnson, A., 2016. Safely Measuring Tor.
Proceedings of CCS’16. To appear
Ling, Z., Luo, J., Wu, K., Yu, W., and Fu, X. 2015.
TorWard: Discovery, Blocking, and Traceback of
Malicious Traffic Over Tor, IEEE Tr. on Information
Forensics and Security, Vol 10/12, 2515 - 2530
Loesing, K., Sandmann, W., Wilms, C., and Wirtz, G.
2008. Performance Measurements and Statistics of Tor
Hidden Services, Applications and the Internet. SAINT
2008. Turku, 2008, 1-7
Loesing, K., Murdoch, S. J., and Dingledine, R. 2010. A
case study on measuring statistical data in the tor
anonymity network, Proceedings of the 14th
international conference on Financial cryptograpy
and data security (FC'10), Springer, 203-215
MaxMind, GeoLite2 Legacy Downloadable Databases,
[online] https://dev.maxmind.com/geoip/legacy/geolite
[Accessed 21.9.2016]
McCoy, D., Bauer, K., Grunwald, D., Kohno, T., and
Sicker, D. 2008. Shining light in dark places:
Understanding the Tor network, Proceedings of the
8th International Symposium on Privacy Enhancing
Technol. (PETS), 63–76
Pmacct project, [online] http://www.pmacct.net/
[Accessed 21.9.2016]
Soghoian, C., 2011. Enforced Community Standards For
research on Users of the Tor Anonymity Network,
Proc. 2011 International Conference on Financial
Cryptography and Data Security, Springer, 146-153
Sonntag, M., 2015. Rechtsfragen im Zusammenhang mit
dem Betrieb eines Anonymisierungsdienstes. JusIT 6,
2015, 215-222