From the course: Exploring Tor and the Dark Web

Unlock the full course today

Join today to access over 23,100 courses taught by industry experts.

Passive traffic analysis

Passive traffic analysis

- [Instructor] Passive traffic analysis attacks follow a pattern that's quite similar to user behavior analysis to tie together traffic from the regular internet and anonymized Tor traffic. The major difference between the two techniques is that user behavior analysis depends upon insecure user activity, or as the NSA called them, dumb users. Passive traffic analysis looks for patterns in the way that a user's computer, browser or network behaves. For example, an analyst might notice that the web requests sent by a certain user contain a combination of unique attributes added by the combination of operating system, hardware and patch level. If those characteristics appear in both Tor traffic and regular internet traffic, it may be possible to make a connection. Now if that sounds challenging and farfetched, that's because it is. While some users might be using obscure operating systems, most users use a very few common operating systems. So it might be hard to tie a signature to a…

Contents