Application-level attack against Tor's hidden service

@article{Zhang2011ApplicationlevelAA,
  title={Application-level attack against Tor's hidden service},
  author={Lu Zhang and Junzhou Luo and Ming Yang and Gaofeng He},
  journal={2011 6th International Conference on Pervasive Computing and Applications},
  year={2011},
  pages={509-516}
}
Tor has become one of the most popular overlay networks for anonymizing TCP traffic. Hidden service provided by Tor allows users to run a TCP server under a pseudonym, and its resources can be accessed without the operator's real identity being revealed. In this paper, we propose a novel HTTP based application-level attack against Tor's hidden web service. Under the assumption that the entry of the suspected hidden server's circuit is occupied, we evaluate the time correlation between the web… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-8 OF 8 CITATIONS

Shedding Light on the Dark Corners of the Internet: A Survey of Tor Research

  • J. Network and Computer Applications
  • 2018
VIEW 4 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Novel and Practical SDN-based Traceback Technique for Malicious Traffic over Anonymous Networks

  • IEEE INFOCOM 2019 - IEEE Conference on Computer Communications
  • 2019
VIEW 1 EXCERPT
CITES BACKGROUND

A novel application classification attack against Tor

  • Concurrency and Computation: Practice and Experience
  • 2015
VIEW 1 EXCERPT
CITES METHODS

IM session identification by outlier detection in cross-correlation functions

  • 2015 49th Annual Conference on Information Sciences and Systems (CISS)
  • 2015
VIEW 1 EXCERPT
CITES METHODS

TorWard: Discovery, Blocking, and Traceback of Malicious Traffic Over Tor

  • IEEE Transactions on Information Forensics and Security
  • 2015
VIEW 1 EXCERPT
CITES BACKGROUND

TorWard: Discovery of malicious traffic over Tor

  • IEEE INFOCOM 2014 - IEEE Conference on Computer Communications
  • 2014
VIEW 1 EXCERPT
CITES BACKGROUND

Protocol-level hidden server discovery

  • 2013 Proceedings IEEE INFOCOM
  • 2013
VIEW 2 EXCERPTS
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 20 REFERENCES

Tor path specification

R. Dingledine, N. Mathewson
  • https:llgitweb.torproject.org/torspec.gitiblobIHEAD:/path -spec.txt,
  • 2011

Tor protocol specificati on", https:llgitweb.torproject.org/torspec.gitlblobIHEAD: Itor-spec.txt,2011

R. Dingledine, N. Mathewson
  • 2011

Cyber Crime Scene Investigations (C²SI) through Cloud Computing

  • 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops
  • 2010

A New Replay Attack Against Anonymous Communication Networks

  • 2008 IEEE International Conference on Communications
  • 2008