Shedding light on the dark corners of the internet: A survey of tor research

S Saleh, J Qadir, MU Ilyas - Journal of Network and Computer Applications, 2018 - Elsevier
Anonymity services have seen high growth rates with increased usage in the past few years.
Among various services, Tor is one of the most popular peer-to-peer anonymizing service. In …

Shadow: Running Tor in a box for accurate and efficient experimentation

R Jansen, NJ Hopper - 2011 - conservancy.umn.edu
Tor is a large and popular overlay network providing both anonymity to its users and a
platform for anonymous communication research. New design proposals and attacks on the …

Anonymity services tor, i2p, jondonym: classifying in the dark (web)

A Montieri, D Ciuonzo, G Aceto… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Traffic Classification (TC) is an important tool for several tasks, applied in different fields
(security, management, traffic engineering, R&D). This process is impaired or prevented by …

Enhancing Tor's performance using real-time traffic classification

M AlSabah, K Bauer, I Goldberg - … of the 2012 ACM conference on …, 2012 - dl.acm.org
Tor is a low-latency anonymity-preserving network that enables its users to protect their
privacy online. It consists of volunteer-operated routers from all around the world that serve …

Congestion-aware path selection for Tor

T Wang, K Bauer, C Forero, I Goldberg - Financial Cryptography and Data …, 2012 - Springer
Tor, an anonymity network formed by volunteer nodes, uses the estimated bandwidth of the
nodes as a central feature of its path selection algorithm. The current load on nodes is not …

Traffic classification of user behaviors in tor, i2p, zeronet, freenet

Y Hu, F Zou, L Li, P Yi - … on trust, security and privacy in …, 2020 - ieeexplore.ieee.org
In recent years, more and more anonymous network have been developed. Since user's
identity is difficult to trace in anonymous networks, many illegal activities are carried out in …

Multilevel identification and classification analysis of Tor on mobile and PC platforms

L Wang, H Mei, VS Sheng - IEEE Transactions on Industrial …, 2020 - ieeexplore.ieee.org
In digitalized and automated systems, more and more intelligent devices have become an
import part of industrial Internet of Things (IIOT). However, the lack of security in IIOT makes …

Methodically Modeling the Tor Network.

R Jansen, KS Bauer, N Hopper, R Dingledine - CSET, 2012 - usenix.org
Live Tor network experiments are difficult due to Tor's distributed nature and the privacy
requirements of its client base. Alternative experimentation approaches, such as simulation …

DefenestraTor: Throwing out windows in Tor

M AlSabah, K Bauer, I Goldberg, D Grunwald… - … Symposium, PETS 2011 …, 2011 - Springer
Tor is one of the most widely used privacy enhancing technologies for achieving online
anonymity and resisting censorship. While conventional wisdom dictates that the level of …

The path less travelled: Overcoming Tor's bottlenecks with traffic splitting

M AlSabah, K Bauer, T Elahi, I Goldberg - … , IN, USA, July 10-12, 2013 …, 2013 - Springer
Tor is the most popular low-latency anonymity network for enhancing ordinary users' online
privacy and resisting censorship. While it has grown in popularity, Tor has a variety of …