2010 Fourth International Conference on Network and System Security 2010
DOI: 10.1109/nss.2010.47
|View full text |Cite
|
Sign up to set email alerts
|

Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network

Abstract: Abstract-Users' anonymity and privacy are among the major concerns of today's Internet. Anonymizing networks are then poised to become an important service to support anonymousdriven Internet communications and consequently enhance users' privacy protection. Indeed, Tor an example of anonymizing networks based on onion routing concept attracts more and more volunteers, and is now popular among dozens of thousands of Internet users. Surprisingly, very few researches shed light on such an anonymizing network. Be… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

5
63
0
1

Year Published

2012
2012
2020
2020

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 82 publications
(70 citation statements)
references
References 7 publications
5
63
0
1
Order By: Relevance
“…Almubayed et al [41] proposed a research has considered many ML algorithms to fingerprint Tor usage in the network. Chaabane et al [42] provides a deep analysis of both the HTTP and BitTorrent protocols giving a complete overview of their usage, depict how users behave on top of Tor and also show that Tor usage is now diverted from the onion routing concept and that Tor exit nodes are frequently used as 1-hop SOCKS proxies, through a so-called tunneling technique. Finally, Chakravarty et al proposed methods for performing traffic analysis using remote network bandwidth estimation tools, to identify the Tor relays and routers involved in Tor circuits [43,44].…”
Section: Related Workmentioning
confidence: 99%
“…Almubayed et al [41] proposed a research has considered many ML algorithms to fingerprint Tor usage in the network. Chaabane et al [42] provides a deep analysis of both the HTTP and BitTorrent protocols giving a complete overview of their usage, depict how users behave on top of Tor and also show that Tor usage is now diverted from the onion routing concept and that Tor exit nodes are frequently used as 1-hop SOCKS proxies, through a so-called tunneling technique. Finally, Chakravarty et al proposed methods for performing traffic analysis using remote network bandwidth estimation tools, to identify the Tor relays and routers involved in Tor circuits [43,44].…”
Section: Related Workmentioning
confidence: 99%
“…Anonymized or encrypted communication hamper the investigation and might distract the analysis of the captured data. Tor [10] provides anonymity based on onion routing, I2P [46] uses a decentralized mix network that prevents the identification of the users [3]. analyses the traffic travelling through the Tor by using deep packet inspection techniques.…”
Section: Problemsmentioning
confidence: 99%
“…The main congestion control mechanism used by Tor is an end-to-end window based system, where the exit relay and client use SENDME control cells to infer network level congestion. Tor separates data flowing inbound from data flowing outbound, 3 and congestion control mechanisms operate independently on each flow. Each circuit starts with an initial 1000 cell window which is decremented by the source edge node for every cell sent.…”
Section: Congestion Controlmentioning
confidence: 99%
“…Finally, the TorPerf clients only perform one download every 10 minutes, where the small, medium and large clients download 50 KiB, 1 MiB and 5MiB files respectively. This distribution of clients is used to approximate the findings of McCoy et al [23], Chaabane et al [3] and data from Tor [31].…”
Section: Experimental Setup and Modelmentioning
confidence: 99%