A Mapping Study on The Behavirol Analysis of Tor Relay Protocol

被引:0
|
作者
Ince, Ayse Bilge [1 ]
Aktas, Mehmet S. [1 ]
机构
[1] Yildiz Tekn Univ, Bilgisayar Muhendisligi Bolumu, Istanbul, Turkey
来源
2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK) | 2017年
关键词
Tor; hidden service directories; anonimity; Tor relays;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Tor, uses a protocol aimed at ensuring anonymity by distributing its communication over relays all over the world. This protocol designed to protect the privacy of Internet users from traffic analysis attacks launched by an adversary. The studies in the literature have shown that some attacks can be performed in the hidden service relays, or in exit nodes of services by eliminating anonimity. In this paper, a mapping study is conducted among the publications in the literature on Tor Service Protocol behavioral analysis and the results are reported.
引用
收藏
页码:288 / 293
页数:6
相关论文
共 50 条
  • [21] A Dynamic Selection Algorithm of Tor Relay Based on Client Bias
    Zhang, Yun
    Xia, YaMei
    2021 22ND ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 2021, : 41 - 44
  • [22] An Improved Tor Circuit-Building Protocol
    Liu, Xin
    Wang, Neng
    FIRST IITA INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2009, : 671 - 675
  • [23] Protocol-level attacks against Tor
    Ling, Zhen
    Luo, Junzhou
    Yu, Wei
    Fu, Xinwen
    Jia, Weijia
    Zhao, Wei
    COMPUTER NETWORKS, 2013, 57 (04) : 869 - 886
  • [24] Forensic analysis of Tor in Windows environment: A case study
    Angeli, Vaia-Maria
    Atamli, Ahmad
    Karafili, Erisa
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
  • [25] Performance Analysis of a Persistent Relay Carrier Sensing Multiple Access Protocol
    Alonso-Zarate, J.
    Alonso, L.
    Verikoukis, Ch.
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (12) : 5827 - 5831
  • [26] A Relay Selection Protocol for Wireless Energy Harvesting Relay Networks
    Nhu Tri Do
    Vo Nguyen Quoc Bao
    An, Beongku
    2015 INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR COMMUNICATIONS (ATC), 2015, : 243 - 247
  • [27] Tracing Tor Hidden Service Through Protocol Characteristics
    Qin, Yi
    Zheng, Tianming
    Wu, Yue
    Zou, Futai
    2022 31ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2022), 2022,
  • [28] Mapping of long COVID condition in India: a study protocol for systematic review and meta-analysis
    Jain, Nidhi
    Shah, Komal
    Chauhan, Roshani
    Gupta, Abhishek
    Arora, Priyanka
    Saxena, Deepak
    Mavalankar, Dileep
    FRONTIERS IN REHABILITATION SCIENCES, 2025, 6
  • [29] Performance Analysis of an Opportunistic Relay Selection Protocol for Multi-Hop Networks
    Stamatiou, Kostas
    Chiarotto, Davide
    Librino, Federico
    Zorzi, Michele
    IEEE COMMUNICATIONS LETTERS, 2012, 16 (11) : 1752 - 1755
  • [30] Threshold Based Relay Selection Protocol for Wireless Relay Networks with Interference
    Si, JiangBo
    Li, Zan
    Liu, ZengJi
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2010,