Analysis on End-to-End Node Selection Probability in Tor Network

被引:0
|
作者
Dahal, Saurav [1 ]
Lee, Junghee [2 ]
Kang, Jungmin [2 ]
Shin, Seokjoo [1 ]
机构
[1] Chosun Univ, Dept Comp Engn, Gwangju, South Korea
[2] Attached Inst ETRI, Daejeon, South Korea
关键词
selection probability; nodes; Tor; Shadow;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Tor is an open network that helps to defend against traffic analysis and thus achieves anonymity and resisting censorship online. Nowadays many researches have been carried out to attack Tor and to break the anonymity. To deanonymize the Tor, the attacker must be able to control both the guard node and exit node of a circuit. In this paper, we present an analysis on end-to-end node selection probability when an attacker adds different types of compromised nodes in the existing Tor network. For accurate Tor simulation, we used Shadow simulator for our experiment. By extensive performance evaluation, we conclude that when guard + exit flagged compromised nodes are added to Tor network, the selection probability of compromised nodes gets higher.
引用
收藏
页码:46 / 50
页数:5
相关论文
共 50 条
  • [31] Demo Abstract: End-to-end Root Cause Analysis of a Mobile Network
    Salaun, Achille
    Bouillard, Anne
    Buob, Marc-Olivier
    IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2020, : 1324 - 1325
  • [32] Analysis of end-to-end delay on AFDX based on stochastic network calculus
    Wu, Zhi-Tao
    Huang, Ning
    Wang, Xue-Wang
    Hu, Ning
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2013, 35 (01): : 168 - 172
  • [33] Solid End-to-end Probing and Analysis Method for Estimating Network Loss
    Ren, Yanjie
    Qiao, Yan
    Qiu, Xuesong
    Wu, Shun-an
    PROCEEDINGS OF 2011 INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENCE AND AWARENESS INTERNET, IET AIAI2011, 2011, : 318 - 322
  • [34] Designing a holistic end-to-end intelligent network analysis and security platform
    Alzahrani, M.
    2ND INTERNATIONAL CONFERENCE ON COMPUTING AND APPLIED INFORMATICS 2017, 2018, 978
  • [35] AN ALGORITHM FOR END-TO-END PERFORMANCE ANALYSIS OF NETWORK BASED ON TRAFFIC ENGINEERING
    Liu Huailiang Zhang Xin Wang Dong Xu Guohua (School of Mechano-electronic Engineering
    Journal of Electronics(China), 2003, (04) : 293 - 298
  • [36] Efficient end-to-end QoS mechanism using egress node resource prediction in NGN network
    Ban, SY
    Choi, JK
    Kim, HS
    8th International Conference on Advanced Communication Technology, Vols 1-3: TOWARD THE ERA OF UBIQUITOUS NETWORKS AND SOCIETIES, 2006, : U480 - U483
  • [37] End-to-End Delay Analysis of a Wireless Sensor Network Using Stochastic Network Calculus
    Azuaje, Orangel
    Aguiar, Ana
    2019 WIRELESS DAYS (WD), 2019,
  • [38] Towards Unbiased End-to-End Network Diagnosis
    Zhao, Yao
    Chen, Yan
    Bindel, David
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2009, 17 (06) : 1724 - 1737
  • [39] A Multiplexed Network for End-to-End, Multilingual OCR
    Huang, Jing
    Pang, Guan
    Kovvuri, Rama
    Toh, Mandy
    Liang, Kevin J.
    Krishnan, Praveen
    Yin, Xi
    Hassner, Tal
    2021 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, CVPR 2021, 2021, : 4545 - 4555
  • [40] End-to-End Network Slicing for Flash Crowds
    Marinova, Simona
    Rakovic, Valentin
    Denkovski, Daniel
    Lin, Thomas
    Atanasovski, Vladimir
    Bannazadeh, Hadi
    Gavrilovska, Liljana
    Leon-Garcia, Alberto
    IEEE COMMUNICATIONS MAGAZINE, 2020, 58 (04) : 31 - 37