Anonymity with Tor: A Survey on Tor Attacks

09/28/2020
by   Ishan Karunanayake, et al.
0

Anonymity networks are becoming increasingly popular in today's online world as more users attempt to safeguard their online privacy. Tor is currently the most popular anonymity network in use and provides anonymity to both users and services (hidden services). However, the anonymity provided by Tor is also being misused in various ways. Hosting illegal sites for selling drugs, hosting command and control servers for botnets, and distributing censored content are but a few such examples. As a result, various parties, including governments and law enforcement agencies, are interested in attacks that assist in de-anonymising the Tor network, disrupting its operations, and bypassing its censorship circumvention mechanisms. In this paper, we survey known Tor attacks and identify currently available techniques that lead to improved de-anonymisation of users and hidden services.

READ FULL TEXT
research
12/14/2020

Holes in the Geofence: Privacy Vulnerabilities in "Smart" DNS Services

Smart DNS (SDNS) services advertise access to "geofenced" content (typic...
research
06/29/2018

How Do Tor Users Interact With Onion Services?

Onion services are anonymous network services that are exposed over the ...
research
01/24/2022

DDoSDet: An approach to Detect DDoS attacks using Neural Networks

Cyber-attacks have been one of the deadliest attacks in today's world. O...
research
10/21/2020

"Are you home alone?" "Yes" Disclosing Security and Privacy Vulnerabilities in Alexa Skills

The home voice assistants such as Amazon Alexa have become increasingly ...
research
10/20/2018

Security Services Using Blockchains: A State of the Art Survey

This article surveys blockchain-based approaches for several security se...
research
03/23/2021

Detecting Phishing Sites – An Overview

Phishing is one of the most severe cyber-attacks where researchers are i...
research
10/04/2018

Information Market for Web Browsing: Design, Usability and Incremental Adoption

Browsing privacy solutions face an uphill battle to deployment. Many ope...

Please sign up or login with your details

Forgot password? Click here to reset