Analysis on End-to-End Node Selection Probability in Tor Network

被引:0
|
作者
Dahal, Saurav [1 ]
Lee, Junghee [2 ]
Kang, Jungmin [2 ]
Shin, Seokjoo [1 ]
机构
[1] Chosun Univ, Dept Comp Engn, Gwangju, South Korea
[2] Attached Inst ETRI, Daejeon, South Korea
关键词
selection probability; nodes; Tor; Shadow;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Tor is an open network that helps to defend against traffic analysis and thus achieves anonymity and resisting censorship online. Nowadays many researches have been carried out to attack Tor and to break the anonymity. To deanonymize the Tor, the attacker must be able to control both the guard node and exit node of a circuit. In this paper, we present an analysis on end-to-end node selection probability when an attacker adds different types of compromised nodes in the existing Tor network. For accurate Tor simulation, we used Shadow simulator for our experiment. By extensive performance evaluation, we conclude that when guard + exit flagged compromised nodes are added to Tor network, the selection probability of compromised nodes gets higher.
引用
收藏
页码:46 / 50
页数:5
相关论文
共 50 条
  • [1] Satellite selection with an end-to-end deep learning network
    Huang, Panpan
    Rizos, Chris
    Roberts, Craig
    GPS SOLUTIONS, 2018, 22 (04)
  • [2] Satellite selection with an end-to-end deep learning network
    Panpan Huang
    Chris Rizos
    Craig Roberts
    GPS Solutions, 2018, 22
  • [3] An End-to-End Toolkit for Social Network Analysis
    Hao, Jun
    Zhao, Xinghui
    2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2020, : 5692 - 5694
  • [4] Modelling and analysis of end-to-end network performance
    Zhanikeev, Marat
    Tanaka, Yoshiaki
    2008 7TH ASIA-PACIFIC SYMPOSIUM ON INFORMATION AND TELECOMMUNICATION TECHNOLOGIES, 2008, : 201 - +
  • [5] End-to-end availability analysis of physical network
    Kong, RS
    Zhou, HB
    FOURTH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2004, : 668 - 673
  • [6] A JUNCTION NETWORK OPTIMIZATION METHOD UNDER END-TO-END BLOCKING PROBABILITY CONSTRAINTS
    YOSHIDA, M
    OKAZAKI, H
    NEC RESEARCH & DEVELOPMENT, 1984, (75): : 83 - 89
  • [7] Network Planning Guaranteeing End-to-end Overload Probability for Stochastic Traffic Demands
    Tran, Phuong Nga
    Cahyanto, Bharata Dwi
    Timm-Giel, Andreas
    2014 16TH INTERNATIONAL TELECOMMUNICATIONS NETWORK STRATEGY AND PLANNING SYMPOSIUM (NETWORKS), 2014,
  • [8] Deterministic end-to-end delay analysis in an avionics network
    Zhou, Hairui
    Li, Jian
    Hu, Chengchen
    Ji, Xiaoqiang
    He, Lina
    Hu, Fei
    PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART G-JOURNAL OF AEROSPACE ENGINEERING, 2013, 227 (10) : 1583 - 1595
  • [9] Network analysis on Skype end-to-end video quality
    Exarchakos, George
    Druda, Luca
    Menkovski, Vlado
    Liotta, Antonio
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2015, 11 (01) : 17 - +
  • [10] SDWN for End-to-End QoS Path Selection in a Wireless Network Ecosystem
    Semenciuc, Eugeniu
    Pastrav, Andra
    Palade, Tudor
    Puschita, Emanuel
    FUTURE ACCESS ENABLERS FOR UBIQUITOUS AND INTELLIGENT INFRASTRUCTURES, FABULOUS 2017, 2018, 241 : 134 - 140