Skip to main content

Examination of Defense Method for Tor User Specific Purpose Attacks by Dummy User Attached Communication

  • Conference paper
  • First Online:
Web, Artificial Intelligence and Network Applications (WAINA 2020)


In recent years, the anonymous communication system Tor that prevents the user’s access destination website from being specified has become widespread. However, attack methods for anonymity are gradually evolving. As one of the attack methods, there is a “web fingerprint attack” that identifies the Web site accessed by the user from the characteristics of the flowing packets. Therefore, in this paper, we examine a defense method against fingerprint attack against Tor. We devised a method to rewrite the “user fingerprint information” in the access history of legitimate users by analyzing the Tor Hidden Service packet and accessing the target site and dummy site simultaneously using approximate routing with multiple Tor browsers did. This “dummy user generated noise” shows that the effect of fingerprint attack can be reduced.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others


  1. Tor Project: Anonymity online. Accessed 10 Nov 2018

  2. Takenouchi, A., Matsuura, K.: The effect of dummy packet on the detection of Tor hidden service. In: Proceedings of the Computer Security Symposium 2016, vol. 2, pp. 26–33 (2016)

    Google Scholar 

  3. Wang, T., Cai, X., Nithyanand, R., Johnson, R., Goldberg, I.: Effective attacks and provable defenses for website fingerprinting. In: Proceedings of the 23rd USENIX Conference on Security Symposium (2014)

    Google Scholar 

  4. Wang, T., Goldberg, I.: Improved website fingerprinting on Tor. In: Proceedings of the 12th ACM Workshop on Privacy in the Electronic Society (2013)

    Google Scholar 

  5. Tokyo Denki University Network System Laboratory: Identify web pages by traffic flow. Accessed 15 Nov 2018

  6. Yokote, K., Matsuura, K.: Anti-transform of Tor traffic to threaten its anonymity. In: Proceedings of the Computer Security Symposium 2012, vol. 3, pp. 624–631 (2012)

    Google Scholar 

  7. Panchenko, A., Niessen, L., Zinnen, A., Engel, T.: Website fingerprinting in Onion Routing based anonymization networks. In: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, WPES 2011, New York, NY, USA, 2011, pp. 103–114. ACM (2011)

    Google Scholar 

  8. Yokoyama, E., Sou, H., Yamaba, H., Kubota, S., Park, M., Okazaki, N.: An examination on countermeasure toward fingerprinting attack upon the Tor anonymity system. In: Proceedings of the Multimedia, Distributed, Cooperative and Mobile (DICOMO 2014) Symposium, vol. 2 pp. 26–33 (2016)

    Google Scholar 

  9. ConoHa: ConoHa by GMO. Accessed 23 Oct 2019

  10. Wireshark: Wireshark. Accessed 01 May 2018

Download references

Author information

Authors and Affiliations


Corresponding author

Correspondence to Motoharu Takahashi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Takahashi, M., Narita, M., Inomata, T., Sugino, E. (2020). Examination of Defense Method for Tor User Specific Purpose Attacks by Dummy User Attached Communication. In: Barolli, L., Amato, F., Moscato, F., Enokido, T., Takizawa, M. (eds) Web, Artificial Intelligence and Network Applications. WAINA 2020. Advances in Intelligent Systems and Computing, vol 1150. Springer, Cham.

Download citation

Publish with us

Policies and ethics