A Mapping Study on The Behavirol Analysis of Tor Relay Protocol

被引:0
|
作者
Ince, Ayse Bilge [1 ]
Aktas, Mehmet S. [1 ]
机构
[1] Yildiz Tekn Univ, Bilgisayar Muhendisligi Bolumu, Istanbul, Turkey
来源
2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK) | 2017年
关键词
Tor; hidden service directories; anonimity; Tor relays;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Tor, uses a protocol aimed at ensuring anonymity by distributing its communication over relays all over the world. This protocol designed to protect the privacy of Internet users from traffic analysis attacks launched by an adversary. The studies in the literature have shown that some attacks can be performed in the hidden service relays, or in exit nodes of services by eliminating anonimity. In this paper, a mapping study is conducted among the publications in the literature on Tor Service Protocol behavioral analysis and the results are reported.
引用
收藏
页码:288 / 293
页数:6
相关论文
共 50 条
  • [1] Performance analysis on the unicasting relay protocol and relay selection
    Long, Hang
    Wei, Mei-Ying
    Shen, Shan-Shan
    Zheng, Kan
    Wang, Wen-Bo
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2010, 33 (04): : 74 - 78
  • [2] Study on Protocol Design and Performance Analysis for Cognitive Relay Networks
    Chen, Lei
    Yan, Shengnan
    Wang, Hongyu
    Sun, Tian
    2014 IEEE 79TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-SPRING), 2014,
  • [3] Measuring Tor Relay Popularity
    Chen, Tao
    Cui, Weiqi
    Chan-Tin, Eric
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT I, 2019, 304 : 386 - 405
  • [4] Statistical and combinatorial analysis of the TOR routing protocol: structural weaknesses identified in the TOR network
    Eric Filiol
    Maxence Delong
    J. Nicolas
    Journal of Computer Virology and Hacking Techniques, 2020, 16 : 3 - 18
  • [5] Statistical and combinatorial analysis of the TOR routing protocol: structural weaknesses identified in the TOR network
    Filiol, Eric
    Delong, Maxence
    Nicolas, J.
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2020, 16 (01) : 3 - 18
  • [6] Statistical and Combinatorial Analysis of the TOR Routing Protocol Structural Weaknesses Identified in the TOR Network
    Filiol, Eric
    Nicolas, J.
    Delong, Maxence
    ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, : 507 - 516
  • [7] On the security of the Tor authentication protocol
    Goldberg, Ian
    Privacy Enhancing Technologies, 2006, 4258 : 316 - 331
  • [8] Beyond TOR: The TrueNyms Protocol
    Bernard, Nicolas
    Leprevost, Franck
    SECURITY AND INTELLIGENT INFORMATION SYSTEMS, 2012, 7053 : 68 - 84
  • [9] A Study on Security Analysis of the Unlinkability in Tor
    Tian, Jing
    Gou, Gaopeng
    Guan, Yangyang
    Xia, Wei
    Xiong, Gang
    Liu, Chang
    2021 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2021), 2021,
  • [10] OPTIMIZATION OF DNA EXTRACTION AND PCR PROTOCOL FOR RAPD ANALYSIS OF TOR PUTITORA
    Shafi, N.
    Janjua, S.
    Jafar, S.
    Anwar, K.
    Mian, A.
    JOURNAL OF ANIMAL AND PLANT SCIENCES, 2015, 25 (03): : 536 - 541