Analysis on End-to-End Node Selection Probability in Tor Network

被引:0
|
作者
Dahal, Saurav [1 ]
Lee, Junghee [2 ]
Kang, Jungmin [2 ]
Shin, Seokjoo [1 ]
机构
[1] Chosun Univ, Dept Comp Engn, Gwangju, South Korea
[2] Attached Inst ETRI, Daejeon, South Korea
关键词
selection probability; nodes; Tor; Shadow;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Tor is an open network that helps to defend against traffic analysis and thus achieves anonymity and resisting censorship online. Nowadays many researches have been carried out to attack Tor and to break the anonymity. To deanonymize the Tor, the attacker must be able to control both the guard node and exit node of a circuit. In this paper, we present an analysis on end-to-end node selection probability when an attacker adds different types of compromised nodes in the existing Tor network. For accurate Tor simulation, we used Shadow simulator for our experiment. By extensive performance evaluation, we conclude that when guard + exit flagged compromised nodes are added to Tor network, the selection probability of compromised nodes gets higher.
引用
收藏
页码:46 / 50
页数:5
相关论文
共 50 条
  • [21] The challenges of end-to-end network resilience
    Tornatore, Massimo
    2021 EUROPEAN CONFERENCE ON OPTICAL COMMUNICATION (ECOC), 2021,
  • [22] The notion of end-to-end capacity and its application to the estimation of end-to-end network delays
    Kim, HS
    Shroff, NB
    COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2005, 48 (03): : 475 - 488
  • [23] Probability Distribution of End-to-End Delay in a Highway VANET
    Shahidi, Reza
    Ahmed, Mohamed Hossam
    IEEE COMMUNICATIONS LETTERS, 2014, 18 (03) : 443 - 446
  • [24] The end-to-end effects of Internet path selection
    Savage, S
    Collins, A
    Hoffman, E
    Snell, J
    Anderson, T
    ACM SIGCOMM'99 CONFERENCE: APPLICATIONS, TECHNOLOGIES, ARCHITECTURES, AND PROTOCOLS FOR COMPUTER COMMUNICATIONS, 1999, 29 (04): : 289 - 299
  • [25] End-to-end effects of Internet path selection
    Department of Computer Science and Engineering, University of Washington, Seattle, United States
    Comput Commun Rev, 4 (289-299):
  • [26] Outage probability analysis of cognitive relay network with four relay selection and end-to-end performance with modified quasi-orthogonal space-time coding
    Manna, Mustafa Abdelaziz
    Chen, Gaojie
    Chambers, Jonathon A.
    IET COMMUNICATIONS, 2014, 8 (02) : 233 - 241
  • [27] Zone recovery methodology for probe-subset selection in end-to-end network monitoring
    Ozmutla, HC
    Gautam, N
    Barton, RR
    NOMS 2002: IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM: MANAGEMENT SOLUTIONS FOR THE NEW COMMUNICATIONS WORLD, 2002, : 451 - 464
  • [28] Towards end-to-end integrated optical packet network: Empirical analysis
    Haddaji, Nassim
    Nguyen, Kim
    Cheriet, Mohamed
    OPTICAL SWITCHING AND NETWORKING, 2018, 27 : 18 - 39
  • [29] End-to-End Throughput Analysis of Multihop Wireless Networks with Network Coding
    Yazane, Takashi
    Masuyama, Hiroyuki
    Kasahara, Shoji
    Takahashi, Yutaka
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2010,
  • [30] Scheduling Design and Analysis for End-to-End Heterogeneous Flows in an Avionics Network
    Hua, Yu
    Liu, Xue
    2011 PROCEEDINGS IEEE INFOCOM, 2011, : 2417 - 2425