2015
DOI: 10.1016/j.jss.2015.01.002
|View full text |Cite
|
Sign up to set email alerts
|

A composite-metric based path selection technique for the Tor anonymity network

Abstract: Abstract-The Tor anonymous network has become quite popular with regular users on the Internet. In the Tor network, an anonymous path is created by selecting three relays through which the connection is redirected. Nevertheless, as the number of Tor users has increased substantially in recent years, the algorithm with which the relays are selected affects the performance provided by the Tor network. More importantly as the performance suffers, users will leave the network, resulting in a lower anonymity set an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 27 publications
0
4
0
Order By: Relevance
“…There are many studies that evaluate the anonymity of systems from various perspectives, but ultimately combine with information entropy to obtain anonymity. For example, Piotrowska et al (2017) Milajerdi and Kharrazi (2015) calculated the entropy value representing the system's anonymity level by statistically computing the proportion of node combinations in the path as the probability of identifying the path. Xia et al ( 2021) utilized information entropy to evaluate the anonymity of the T-hybrid network, considering network attributes including the proportion of compromised nodes, the size of anonymous sets, and path length.…”
Section: Combined With Information Entropymentioning
confidence: 99%
See 1 more Smart Citation
“…There are many studies that evaluate the anonymity of systems from various perspectives, but ultimately combine with information entropy to obtain anonymity. For example, Piotrowska et al (2017) Milajerdi and Kharrazi (2015) calculated the entropy value representing the system's anonymity level by statistically computing the proportion of node combinations in the path as the probability of identifying the path. Xia et al ( 2021) utilized information entropy to evaluate the anonymity of the T-hybrid network, considering network attributes including the proportion of compromised nodes, the size of anonymous sets, and path length.…”
Section: Combined With Information Entropymentioning
confidence: 99%
“…Through experiment when the anonymity system is in normal operation, we compared our anonymity evaluation method with existing methods that only rely on a single indicator. Typical applications include evaluating information entropy anonymity based on the distribution of star-end-combs during path construction (Milajerdi and Kharrazi 2015) and calculating Gini coefficient anonymity based on the frequency of node selection (Snader and Borisov 2008), thus testing the dynamics and applicability of our anonymity evaluation method in normal operation.…”
Section: Normal Operation Comparisonmentioning
confidence: 99%
“…However, these suspicious actions do not directly reveal the user’s type because a legitimate user may also take them. For example, both the Tor network connection [ 104 ] and the code obfuscation [ 74 ] can be used legitimately or illegally. Similarly, a defender can also be classified into different types θ 1 based on factors such as their level of security awareness, detection techniques they have adopted, and the completeness of their virus signature database.…”
Section: Recent Advancesmentioning
confidence: 99%
“…For example, domain flux, port scanning and malicious C&C communications, used in the APT attack, can be also used for botnet attacks [33]. Moreover, Tor network connection, used for data exfiltration in the APT attack, can also be used legally to protect the confidentiality of a user traffic [34]. Thus, individually these…”
Section: Apt Detector Description Limitationsmentioning
confidence: 99%