A Mapping Study on The Behavirol Analysis of Tor Relay Protocol

被引:0
|
作者
Ince, Ayse Bilge [1 ]
Aktas, Mehmet S. [1 ]
机构
[1] Yildiz Tekn Univ, Bilgisayar Muhendisligi Bolumu, Istanbul, Turkey
来源
2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK) | 2017年
关键词
Tor; hidden service directories; anonimity; Tor relays;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Tor, uses a protocol aimed at ensuring anonymity by distributing its communication over relays all over the world. This protocol designed to protect the privacy of Internet users from traffic analysis attacks launched by an adversary. The studies in the literature have shown that some attacks can be performed in the hidden service relays, or in exit nodes of services by eliminating anonimity. In this paper, a mapping study is conducted among the publications in the literature on Tor Service Protocol behavioral analysis and the results are reported.
引用
收藏
页码:288 / 293
页数:6
相关论文
共 50 条
  • [31] Performance analysis of dual-hop OFDM relay systems with subcarrier mapping
    Athaudage, C. R. N.
    Saito, M.
    Evans, J.
    2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 4419 - 4423
  • [32] Weaving a Faster Tor: A Multi-Threaded Relay Architecture for Improved Throughput
    Engler, Steven
    Goldberg, Ian
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [33] Performance or Anonymity? Source-Driven Tor Relay Selection for Performance Enhancement
    Zhang, Kelei
    Chang, Sang-Yoon
    2024 33RD INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, ICCCN 2024, 2024,
  • [34] A Multi-phase Decode-and-Forward Transmission Protocol in Cognitive Relay Networks: Outage Analysis and Relay Power Allocation
    Lin, Wenxuan
    Wang, Ying
    Li, Frank Y.
    2015 IEEE 81ST VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING), 2015,
  • [35] Mapping, Infrastructure, and Data Analysis for the Brazilian Network of Rare Diseases: Protocol for the RARASnet Observational Cohort Study
    Alves, Domingos
    Yamada, Diego Bettiol
    Bernardi, Filipe Andrade
    Carvalho, Isabelle
    Colombo Filho, Marcio Eloi
    Neiva, Mariane Barros
    Lima, Vinicius Costa
    Felix, Temis Maria
    JMIR RESEARCH PROTOCOLS, 2021, 10 (01):
  • [36] Tor Traffic Analysis and Identification
    Mercaldo, Francesco
    Martinelli, Fabio
    2017 AEIT INTERNATIONAL ANNUAL CONFERENCE, 2017,
  • [37] Empirical Performance Evaluation of QUIC Protocol for Tor Anonymity Network
    Basyoni, Lamiaa
    Erbad, Aiman
    Alsabah, Mashael
    Fetais, Noora
    Guizani, Mohsen
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 635 - 642
  • [38] Forensic Analysis of Tor Browser: A Case Study for Privacy and Anonymity on the Web
    Jadoon, Abid Khan
    Iqbal, Waseem
    Amjad, Muhammad Faisal
    Afzal, Hammad
    Bangash, Yawar Abbas
    FORENSIC SCIENCE INTERNATIONAL, 2019, 299 : 59 - 73
  • [39] Adaptive Relay Selection Protocol for the Parallel Hybrid RF/FSO Relay Channel
    Najafi, Marzich
    Jamali, Vahid
    Schober, Robert
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [40] Flow-optimized asynchronous relay selection protocol for parallel relay networks
    Tam, Wai P.
    Lok, Tat M.
    Wong, Tan F.
    2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 1024 - +