2015
DOI: 10.1109/tifs.2015.2465934
|View full text |Cite
|
Sign up to set email alerts
|

TorWard: Discovery, Blocking, and Traceback of Malicious Traffic Over Tor

Abstract: Tor is a popular low-latency anonymous communication system. It is, however, currently abused in various ways. Tor exit routers are frequently troubled by administrative and legal complaints. To gain an insight into such abuse, we designed and implemented a novel system, TorWard, for the discovery and systematic study of malicious traffic over Tor. The system can avoid legal and administrative complaints and allows the investigation to be performed in a sensitive environment such as a university campus. An IDS… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
27
0
2

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(29 citation statements)
references
References 16 publications
(28 reference statements)
0
27
0
2
Order By: Relevance
“…Torward is an IDS to detect and classify malicious traffic including botnet traffic at an exit router of the Tor network. The defense system then processes these IDS alerts and blocks suspected connections [19]. Unfortunately, most Tor botnets use hidden services which do not use exit servers.…”
Section: Related Workmentioning
confidence: 99%
“…Torward is an IDS to detect and classify malicious traffic including botnet traffic at an exit router of the Tor network. The defense system then processes these IDS alerts and blocks suspected connections [19]. Unfortunately, most Tor botnets use hidden services which do not use exit servers.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, with the continuous improvement of IP geolocation technology, it is expected that it will play a role in geolocating hidden servers in Tor networks 5,6 and data in Cloud Computing. 7,8 In recent decade years, many methods have been proposed in IP geolocation.…”
Section: Introductionmentioning
confidence: 99%
“…The same process is repeated on one router (hop) at a time to extend the circuit each time with established session keys for the previous routers. The last hop called the exit router communicates direct with the destination as a proxy [1]. With the establishment of three routers, the circuit is ready for internet traffic.…”
Section: Introductionmentioning
confidence: 99%