TorScan: Tracing long-lived connections and differential scanning attacks

3Citations
Citations of this article
42Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Tor is a widely used anonymity network providing low-latency communication capabilities. The anonymity provided by Tor heavily relies on the hardness of linking a user's entry and exit nodes. If an attacker gains access to the topological information about the Tor network instead of having to consider the network as a fully connected graph, this anonymity may be reduced. In fact, we have found ways to probe the connectivity of a Tor relay. We demonstrate how the resulting leakage of the Tor network topology can be used in attacks which trace back a user from an exit relay to a small set of potential entry nodes. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Biryukov, A., Pustogarov, I., & Weinmann, R. P. (2012). TorScan: Tracing long-lived connections and differential scanning attacks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7459 LNCS, pp. 469–486). https://doi.org/10.1007/978-3-642-33167-1_27

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free