2018
DOI: 10.14569/ijacsa.2018.090815
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Tor Encrypted Traffic Monitoring

Abstract: Tor (The Onion Router) is an anonymity tool that is widely used worldwide. Tor protect its user privacy against surveillance and censorship using strong encryption and obfuscation techniques which makes it extremely difficult to monitor and identify users' activity on the Tor network. It also implements strong defense to protect the users against traffic features extraction and website fingerprinting. However, the strong anonymity also became the heaven for criminal to avoid network tracing. Therefore, numerou… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 30 publications
0
4
0
Order By: Relevance
“…In recent years, the academic and industrial communities have paid much attention to traffic classification [12], [28]- [32]. Traditional techniques for traffic classification, like port-based and deep packet inspection (DPI), are no longer adequate due to the exponential growth in encrypted traffic [33]- [35].…”
Section: Related Workmentioning
confidence: 99%
“…In recent years, the academic and industrial communities have paid much attention to traffic classification [12], [28]- [32]. Traditional techniques for traffic classification, like port-based and deep packet inspection (DPI), are no longer adequate due to the exponential growth in encrypted traffic [33]- [35].…”
Section: Related Workmentioning
confidence: 99%
“…Also, note that this report has not been cited in any other publication previously. [2] 2009 Survey existing anonymous communication systems 6 Salo [9] 2010 Survey Tor attacks 10 Nepal et al [15] 2015 Survey de-anonymisation attacks on hidden services 3 Erdin et al [14] 2015 Survey de-anonymisation attacks on users 19 Yang et al [38] 2015 Classification of de-anonymisation techniques 6 AlSabah et al [10] 2016 Survey the research on performance and security of Tor 22 Evers et al [13] 2016 Survey Tor attacks 38 Saleh et al [11] 2018 Survey all aspects of Tor research 23 Aminuddin et al [39] 2018 Survey existing approaches for classifying Tor traffic N/A Kohls et al [40] 2018 An evaluation framework for confirmation attacks 10 Cambiaso et al [12] 2019 Survey Tor attacks 13 Basyoni et al [16] 2020 end passive attacks, congestion and timing attacks as endto-end active attacks, and fingerprinting attacks as single-end passive attacks. Our paper contains more de-anonymisation attacks on Tor when compared with [13], including 17 attacks since 2016, which makes our paper the most comprehensive paper on de-anonymisation attacks to date.…”
Section: Related Workmentioning
confidence: 99%
“…Several other works have been associated with Tor attacks but focus on a different aspect of Tor research. For example, Aminuddin et al [39] investigate the existing literature on Tor traffic classification. Their work focuses on how machine learning techniques have been applied to such classifications and compares those techniques.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations