De-anonymisation attacks on tor: A survey

I Karunanayake, N Ahmed, R Malaney… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Anonymity networks are becoming increasingly popular in today's online world as more
users attempt to safeguard their online privacy. Tor is currently the most popular anonymity …

Characterization of tor traffic using time based features

AH Lashkari, GD Gil, MSI Mamun… - … on Information Systems …, 2017 - scitepress.org
Traffic classification has been the topic of many research efforts, but the quick evolution of
Internet services and the pervasive use of encryption makes it an open challenge …

Deepcorr: Strong flow correlation attacks on tor using deep learning

M Nasr, A Bahramali, A Houmansadr - Proceedings of the 2018 ACM …, 2018 - dl.acm.org
Flow correlation is the core technique used in a multitude of deanonymization attacks on
Tor. Despite the importance of flow correlation attacks on Tor, existing flow correlation …

Shedding light on the dark corners of the internet: A survey of tor research

S Saleh, J Qadir, MU Ilyas - Journal of Network and Computer Applications, 2018 - Elsevier
Anonymity services have seen high growth rates with increased usage in the past few years.
Among various services, Tor is one of the most popular peer-to-peer anonymizing service. In …

[HTML][HTML] Bitcoin money laundering: mixed results? An explorative study on money laundering of cybercrime proceeds using bitcoin

R Van Wegberg, JJ Oerlemans… - Journal of Financial …, 2018 - emerald.com
Purpose This paper aims to shed light into money laundering using bitcoin. Digital payment
methods are increasingly used by criminals to launder money obtained through cybercrime …

Anonymity trilemma: Strong anonymity, low bandwidth overhead, low latency-choose two

D Das, S Meiser, E Mohammadi… - 2018 IEEE Symposium …, 2018 - ieeexplore.ieee.org
This work investigates the fundamental constraints of anonymous communication (AC)
protocols. We analyze the relationship between bandwidth overhead, latency overhead, and …

SnWF: website fingerprinting attack by ensembling the snapshot of deep learning

Y Wang, H Xu, Z Guo, Z Qin… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The website fingerprinting (WF) attack enables a local eavesdropper to identify which
website a client is visiting under encrypted network connections. By leveraging deep neural …

Enhancing security and privacy of tor's ecosystem by using trusted execution environments

S Kim, J Han, J Ha, T Kim, D Han - 14th USENIX Symposium on …, 2017 - usenix.org
With Tor being a popular anonymity network, many attacks have been proposed to break its
anonymity or leak information of a private communication on Tor. However, guaranteeing …

Tor traffic analysis and detection via machine learning techniques

A Cuzzocrea, F Martinelli, F Mercaldo… - … Conference on Big …, 2017 - ieeexplore.ieee.org
Tor is an anonymous Internet communication system based on the second generation of
onion routing network protocol. Using Tor is really difficult to trace the users Internet activity …

TARANET: Traffic-analysis resistant anonymity at the network layer

C Chen, DE Asoni, A Perrig, D Barrera… - 2018 IEEE European …, 2018 - ieeexplore.ieee.org
Modern low-latency anonymity systems, no matter whether constructed as an overlay or
implemented at the network layer, offer limited security guarantees against traffic analysis …