Traffic Analysis Attacks on Tor: A Survey
المؤلف | Basyoni L. |
المؤلف | Fetais N. |
المؤلف | Erbad A. |
المؤلف | Mohamed A. |
المؤلف | Guizani M. |
تاريخ الإتاحة | 2022-04-21T08:58:26Z |
تاريخ النشر | 2020 |
اسم المنشور | 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies, ICIoT 2020 |
المصدر | Scopus |
المعرّف | http://dx.doi.org/10.1109/ICIoT48696.2020.9089497 |
الملخص | The Tor anonymity network is one of the most popular and widely used tools to protect the privacy of online users. Tor provides defenses against multiple adversarial activities aiming to identify or trace the users. Traffic analysis is a very strong tool that can be used for internet surveillance. Traffic analysis attacks against Tor's anonymity network has been known as an open question in research. Moreover, the low-latency feature Tor tries to provide to its users imposes limitations in defending against traffic analysis attacks. In our study, we examine traffic analysis attacks from the perspective of the adopted adversary model and how much it fits within Tor's threat model. The purpose of this study is to evaluate how practical these attacks are on real-time Tor network. 2020 IEEE. |
راعي المشروع | Qatar Foundation;Qatar National Research Fund |
اللغة | en |
الناشر | Institute of Electrical and Electronics Engineers Inc. |
الموضوع | Network security Adversary modeling Anonymity networks Internet surveillances Online users Threat modeling Tor networks Traffic analysis Traffic analysis attacks Internet of things |
النوع | Conference |
الصفحات | 183-188 |
الملفات في هذه التسجيلة
الملفات | الحجم | الصيغة | العرض |
---|---|---|---|
لا توجد ملفات لها صلة بهذه التسجيلة. |
هذه التسجيلة تظهر في المجموعات التالية
-
علوم وهندسة الحاسب [2402 items ]
-
الذكاء المعلوماتي [93 items ]