Low-cost traffic analysis of Tor

@article{Murdoch2005LowcostTA,
  title={Low-cost traffic analysis of Tor},
  author={Steven J. Murdoch and George Danezis},
  journal={2005 IEEE Symposium on Security and Privacy (S&P'05)},
  year={2005},
  pages={183-195}
}
Tor is the second generation onion router supporting the anonymous transport of TCP streams over the Internet. Its low latency makes it very suitable for common tasks, such as Web browsing, but insecure against traffic-analysis attacks by a global passive adversary. We present new traffic-analysis techniques that allow adversaries with only a partial view of the network to infer which nodes are being used to relay the anonymous streams and therefore greatly reduce the anonymity provided by Tor… CONTINUE READING
Highly Influential
This paper has highly influenced 42 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 772 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 340 extracted citations

Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting

ACM Conference on Computer and Communications Security • 2011
View 16 Excerpts
Method Support
Highly Influenced

Hot or not: revealing hidden services by their clock skew

ACM Conference on Computer and Communications Security • 2006
View 12 Excerpts
Highly Influenced

Shedding Light on the Dark Corners of the Internet: A Survey of Tor Research

J. Network and Computer Applications • 2018
View 6 Excerpts
Highly Influenced

Optimal strategies for side-channel leakage in FCFS packet schedulers

2015 IEEE International Symposium on Information Theory (ISIT) • 2015
View 6 Excerpts
Highly Influenced

Revisiting Circuit Clogging Attacks on Tor

2013 International Conference on Availability, Reliability and Security • 2013
View 11 Excerpts
Highly Influenced

773 Citations

0204060'94'99'05'11'17
Citations per Year
Semantic Scholar estimates that this publication has 773 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 44 references

Hypertext Transfer Protocol - HTTP/1.1

View 4 Excerpts
Highly Influenced

The Traffic Analysis of Continuous-Time Mixes

Privacy Enhancing Technologies • 2004
View 3 Excerpts
Highly Influenced

Web MIXes: A System for Anonymous and Unobservable Internet Access

Workshop on Design Issues in Anonymity and Unobservability • 2000
View 4 Excerpts
Highly Influenced

Exploiting the transients of adaptation for RoQ attacks on Internet resources

Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004. • 2004
View 1 Excerpt

Mix cascades vs

R. Bohme, G. Danezis, C. Diaz, S. Kopsell, A. Pfitzmann
peer-to-peer: Is one concept superior? In Privacy Enhancing Technologies (PET 2004), Toronto, Canada, May • 2004
View 1 Excerpt

Mixmaster protocol version 2

U. Moeller, L. Cottrell, P. Palfrader, L. Sassaman
Technical report, Network Working Group, May 25 • 2004
View 1 Excerpt