A Systematic Survey On Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization
D Chao, D Xu, F Gao, C Zhang… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
The importance of safeguarding individuals' privacy rights in online activities is unmistakable
in today's anonymity networks. Since the introduction of Mixnet by Chaum, numerous …
in today's anonymity networks. Since the introduction of Mixnet by Chaum, numerous …
Darknet Traffic Analysis: A Systematic Literature Review
J Saleem, R Islam, Z Islam - IEEE Access, 2024 - ieeexplore.ieee.org
The primary objective of an anonymity tool is to protect the anonymity of its users through the
implementation of strong encryption and obfuscation techniques. As a result, it becomes …
implementation of strong encryption and obfuscation techniques. As a result, it becomes …
Enhancing network tunnels anonymity through increasing combined traffic in a clustered structure
R Mirzaei, N Yazdani, MS Haghighi - Computers & Security, 2025 - Elsevier
Given the visibility of the tunnel creation phase within tunnel-based anonymity structures, an
entity's traffic can be segregated based on the relay selection mechanism employed. Hence …
entity's traffic can be segregated based on the relay selection mechanism employed. Hence …
[PDF][PDF] Flow correlation attacks on tor onion service sessions with sliding subset sum
Tor is one of the most popular anonymity networks in use today. Its ability to defend against
flow correlation attacks is essential for providing strong anonymity guarantees. However, the …
flow correlation attacks is essential for providing strong anonymity guarantees. However, the …
[HTML][HTML] TOAR: Toward Resisting AS-Level Adversary Correlation Attacks Optimal Anonymous Routing
H Zhao, X Song - Mathematics, 2024 - mdpi.com
The Onion Router (Tor), as the most widely used anonymous network, is vulnerable to traffic
correlation attacks by powerful passive adversaries, such as Autonomous Systems (AS). AS …
correlation attacks by powerful passive adversaries, such as Autonomous Systems (AS). AS …
[PDF][PDF] Darknet Traffic Analysis: A Systematic
The primary objective of an anonymity tool is to protect the anonymity of its users through the
implementation of strong encryption and obfuscation techniques. As a result, it becomes …
implementation of strong encryption and obfuscation techniques. As a result, it becomes …
[PDF][PDF] A Review Paper on IPv4 and IPv6: A comprehensive survey
MT Hossain, MN Rahman - 2024 - researchgate.net
Even though more customers are regularly coming to the Internet, IPv4 addresses have
been reduced by the Internet Assigned Numbers Authority (IANA) and have been …
been reduced by the Internet Assigned Numbers Authority (IANA) and have been …