De-anonymisation attacks on tor: A survey

I Karunanayake, N Ahmed, R Malaney… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Anonymity networks are becoming increasingly popular in today's online world as more
users attempt to safeguard their online privacy. Tor is currently the most popular anonymity …

Performance and security improvements for tor: A survey

M AlSabah, I Goldberg - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Tor [Dingledine et al. 2004] is the most widely used anonymity network today, serving
millions of users on a daily basis using a growing number of volunteer-run routers. Since its …

Toward a comprehensive insight into the eclipse attacks of tor hidden services

Q Tan, Y Gao, J Shi, X Wang, B Fang… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
Tor hidden services (HSs) are used to provide anonymity services to users on the Internet
without disclosing the location of the servers so as to enable freedom of speech. However …

Empirical analysis of tor hidden services

G Owen, N Savage - IET Information Security, 2016 - Wiley Online Library
Tor hidden services allow someone to host a website or other transmission control protocol
(TCP) service whilst remaining anonymous to visitors. The collection of all Tor hidden …

A Systematic Survey On Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization

D Chao, D Xu, F Gao, C Zhang… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
The importance of safeguarding individuals' privacy rights in online activities is unmistakable
in today's anonymity networks. Since the introduction of Mixnet by Chaum, numerous …

Tor hidden services: A systematic literature review

DL Huete Trujillo, A Ruiz-Martínez - Journal of Cybersecurity and Privacy, 2021 - mdpi.com
Anonymous communications networks were created to protect the privacy of
communications, preventing censorship and traffic analysis. The most famous anonymous …

[PDF][PDF] Darknet Security: A Categorization of Attacks to the Tor Network.

E Cambiaso, I Vaccari, L Patti, M Aiello - ITASEC, 2019 - ceur-ws.org
In the darknet security topic, it is important to analyze the threats that characterize the
network. This paper deeply investigates the literature of attacks against the Tor network …

Torward: Discovery, blocking, and traceback of malicious traffic over tor

Z Ling, J Luo, K Wu, W Yu, X Fu - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Tor is a popular low-latency anonymous communication system. It is, however, currently
abused in various ways. Tor exit routers are frequently troubled by administrative and legal …

Critical traffic analysis on the tor network

F Platzer, M Schäfer, M Steinebach - Proceedings of the 15th …, 2020 - dl.acm.org
Tor is a widely-used anonymity network with more than two million daily users. A special
feature of Tor is the hidden service architecture. Hidden services are a popular method for …

Revelio: A Network-Level Privacy Attack in the Lightning Network

T Von Arx, M Tran, L Vanbever - 2023 IEEE 8th European …, 2023 - ieeexplore.ieee.org
The Lightning Network (LN) is a widely-adopted off-chain protocol that not only addresses
Bitcoin's scaling problem but also enables anonymous payments. Prior attacks have shown …