2021 Fifth International Conference on I-Smac (IoT in Social, Mobile, Analytics and Cloud) (I-Smac) 2021
DOI: 10.1109/i-smac52330.2021.9640934
|View full text |Cite
|
Sign up to set email alerts
|

Traffic Analysis of High Throughput Traffic on Tor

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…Traffic attacks Studies on new proposed traffic attacks [46], [37], [47] Relay detection Deanonymizing Tor traffic through relay detection [48], [49] Counterattack Counter attack techniques in the dark web [50], [51], [52] Real-time attack detection Applying attack detection techniques on real-time data [53], [54], [55] Data balancing Impact of data balancing Studies focusing on data balancing techniques and their impact on darknet traffic classification [56], [57] Feature selection Feature selection algorithm Studies focusing on the feature selection for the classification purpose [58], [57], [12], [59] Figure 9 Percentage Classification of the Literature reviewed…”
Section: Classification Of Applicationsmentioning
confidence: 99%
See 2 more Smart Citations
“…Traffic attacks Studies on new proposed traffic attacks [46], [37], [47] Relay detection Deanonymizing Tor traffic through relay detection [48], [49] Counterattack Counter attack techniques in the dark web [50], [51], [52] Real-time attack detection Applying attack detection techniques on real-time data [53], [54], [55] Data balancing Impact of data balancing Studies focusing on data balancing techniques and their impact on darknet traffic classification [56], [57] Feature selection Feature selection algorithm Studies focusing on the feature selection for the classification purpose [58], [57], [12], [59] Figure 9 Percentage Classification of the Literature reviewed…”
Section: Classification Of Applicationsmentioning
confidence: 99%
“…The user can choose the link for data transfer but cannot modify the composition of various nodes on the link. The classification of anonymous network traffic has become increasingly difficult due to the implementation of encryption technology [48].…”
Section: A Darknetmentioning
confidence: 99%
See 1 more Smart Citation