2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT) 2020
DOI: 10.1109/iciot48696.2020.9089497
|View full text |Cite
|
Sign up to set email alerts
|

Traffic Analysis Attacks on Tor: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
32
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 39 publications
(32 citation statements)
references
References 17 publications
0
32
0
Order By: Relevance
“…Also, note that this report has not been cited in any other publication previously. [2] 2009 Survey existing anonymous communication systems 6 Salo [9] 2010 Survey Tor attacks 10 Nepal et al [15] 2015 Survey de-anonymisation attacks on hidden services 3 Erdin et al [14] 2015 Survey de-anonymisation attacks on users 19 Yang et al [38] 2015 Classification of de-anonymisation techniques 6 AlSabah et al [10] 2016 Survey the research on performance and security of Tor 22 Evers et al [13] 2016 Survey Tor attacks 38 Saleh et al [11] 2018 Survey all aspects of Tor research 23 Aminuddin et al [39] 2018 Survey existing approaches for classifying Tor traffic N/A Kohls et al [40] 2018 An evaluation framework for confirmation attacks 10 Cambiaso et al [12] 2019 Survey Tor attacks 13 Basyoni et al [16] 2020 end passive attacks, congestion and timing attacks as endto-end active attacks, and fingerprinting attacks as single-end passive attacks. Our paper contains more de-anonymisation attacks on Tor when compared with [13], including 17 attacks since 2016, which makes our paper the most comprehensive paper on de-anonymisation attacks to date.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Also, note that this report has not been cited in any other publication previously. [2] 2009 Survey existing anonymous communication systems 6 Salo [9] 2010 Survey Tor attacks 10 Nepal et al [15] 2015 Survey de-anonymisation attacks on hidden services 3 Erdin et al [14] 2015 Survey de-anonymisation attacks on users 19 Yang et al [38] 2015 Classification of de-anonymisation techniques 6 AlSabah et al [10] 2016 Survey the research on performance and security of Tor 22 Evers et al [13] 2016 Survey Tor attacks 38 Saleh et al [11] 2018 Survey all aspects of Tor research 23 Aminuddin et al [39] 2018 Survey existing approaches for classifying Tor traffic N/A Kohls et al [40] 2018 An evaluation framework for confirmation attacks 10 Cambiaso et al [12] 2019 Survey Tor attacks 13 Basyoni et al [16] 2020 end passive attacks, congestion and timing attacks as endto-end active attacks, and fingerprinting attacks as single-end passive attacks. Our paper contains more de-anonymisation attacks on Tor when compared with [13], including 17 attacks since 2016, which makes our paper the most comprehensive paper on de-anonymisation attacks to date.…”
Section: Related Workmentioning
confidence: 99%
“…In a recent work published in 2020, Basyoni et al [16] present details on several Tor attacks from the perspective of the attack's adopted threat model. The authors of [16] categorise their attack corpus into three threat models; a global adversary, capturing entry flows and compromising Tor nodes. They compare Tor's original threat model with the above threat models.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations