Abstract
Tor is a widely used anonymity network providing low-latency communication capabilities. The anonymity provided by Tor heavily relies on the hardness of linking a user's entry and exit nodes. If an attacker gains access to the topological information about the Tor network instead of having to consider the network as a fully connected graph, this anonymity may be reduced. In fact, we have found ways to probe the connectivity of a Tor relay. We demonstrate how the resulting leakage of the Tor network topology can be used in attacks which trace back a user from an exit relay to a small set of potential entry nodes. © 2012 Springer-Verlag.
Cite
CITATION STYLE
Biryukov, A., Pustogarov, I., & Weinmann, R. P. (2012). TorScan: Tracing long-lived connections and differential scanning attacks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7459 LNCS, pp. 469–486). https://doi.org/10.1007/978-3-642-33167-1_27
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.