Malicious Relay Detection for Tor Network Using Hybrid Multi-Scale CNN-LSTM with Attention

Q Feng, Y Xia, W Yao, T Lu… - 2023 IEEE Symposium on …, 2023 - ieeexplore.ieee.org
With the widespread use of the Tor network, attackers who control malicious relays pose a
serious threat to user privacy. Therefore, identifying malicious relays is crucial for ensuring …

Malicious relay node detection with unsupervised learning in amplify-forward cooperative networks

Y Yengi, A Kavak, H Arslan, K Küçük… - … on Innovation and …, 2019 - ieeexplore.ieee.org
This paper presents malicious relay node detection in a cooperative network using
unsupervised learning based on the received signal samples over the source to destination …

[HTML][HTML] RLFAT: A Transformer-Based Relay Link Forged Attack Detection Mechanism in SDN

T Zhang, Y Wang - Electronics, 2023 - mdpi.com
SDN is a modern internet architecture that has transformed the traditional internet structure
in recent years. By segregating the control and data planes of the network, SDN facilitates …

Good vibrations: artificial ambience-based relay attack detection

I Gurulian, K Markantonakis, E Frank… - 2018 17th IEEE …, 2018 - ieeexplore.ieee.org
Relay attacks are passive man in the middle attacks, aiming to extend the physical distance
of devices involved in a transaction beyond their operating environment, within the restricted …

Spoiled onions: Exposing malicious Tor exit relays

P Winter, R Köwer, M Mulazzani, M Huber… - … Symposium, PETS 2014 …, 2014 - Springer
Tor exit relays are operated by volunteers and together push more than 1 GiB/s of network
traffic. By design, these volunteers are able to inspect and modify the anonymized network …

[PDF][PDF] From “Onion Not Found” to Guard Discovery

L Oldenburg, MGC Acar, C Diaz - 2022 - repository.ubn.ru.nl
We present a novel web-based attack that identifies a Tor user's guard in a matter of
seconds. Our attack is low-cost, fast, and stealthy. It requires only a moderate amount of …

[PDF][PDF] Exitsniffer: Towards comprehensive security analysis of anomalous binding relationship of exit routers

Q Zhang, X Wang, J Shi, M Wang, Y Gao… - China Cyber Security …, 2021 - library.oapen.org
Tor exit relays are operated by volunteers and the trustworthiness of Tor exit relays need to
be revisited in a long-term manner. In this paper, we monitored the Tor network by …

GPU-Accelerated Deep Learning-Based Correlation Attack on Tor Networks

MA Hafeez, Y Ali, KH Han, SO Hwang - IEEE Access, 2023 - ieeexplore.ieee.org
The Tor network, renowned for its provision of online privacy and anonymity, faces the
constant threat of correlation attacks that aim to compromise user identities. For almost two …

Detecting intruders and preventing hackers from evasion by tor circuit selection

Z Cao, SHS Huang - … On Trust, Security And Privacy In …, 2018 - ieeexplore.ieee.org
The widely-used Tor network has become the most popular anonymous network that
supports circuit-based low-latency internet connections. However, recent security breach …

Deep learning algorithm for threat detection in hackers forum (deep web)

V Adewopo, B Gonen, N Elsayed, M Ozer… - arXiv preprint arXiv …, 2022 - arxiv.org
In our current society, the inter-connectivity of devices provides easy access for netizens to
utilize cyberspace technology for illegal activities. The deep web platform is a consummative …