Paper 2021/374

ZXAD: High-volume Attack Mitigation for Tor

Akshaya Mani and Ian Goldberg


The Tor anonymity network is often abused by some attackers to (anonymously) convey attack traffic. These attacks abuse Tor exit relays (i.e., the relays through which traffic exits Tor) by making it appear the attack originates there; as a result, many website operators indiscriminately block all Tor traffic (by blacklisting all exit IPs), reducing the usefulness of Tor. Recent research shows that majority of these attacks are ones that generate high traffic volume (e.g., Denial-of-Service attacks). This suggests that a simple solution such as throttling traffic flow at the Tor exits may permit early detection of these attacks, improve overall reputation of exits, and eventually prevent blanket blocking of Tor exits. However, naively monitoring and throttling traffic at the Tor exits can endanger the privacy of the network's users. This paper introduces ZXAD (pronounced "zed-zad"), a zero-knowledge based _private_ Tor exit abuse detection system that permits identification of otherwise unlinkable connections that are part of a high-volume attack. ZXAD does not reveal any information, apart from the fact that some user is conveying a high volume of traffic through Tor. We formally prove the correctness and security of ZXAD. We also measure two proof-of-concept implementations of our zero-knowledge proofs and show that ZXAD operates with low bandwidth and processing overheads.

Available format(s)
Publication info
Published elsewhere. Minor revision.WPES 2021
anonymityprivacy enhancing technologieszero knowledge
Contact author(s)
akshaya mani @ uwaterloo ca
iang @ uwaterloo ca
2021-09-22: revised
2021-03-22: received
See all versions
Short URL
Creative Commons Attribution


      author = {Akshaya Mani and Ian Goldberg},
      title = {ZXAD: High-volume Attack Mitigation for Tor},
      howpublished = {Cryptology ePrint Archive, Paper 2021/374},
      year = {2021},
      doi = {10.1145/3463676.3485609},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.