• DocumentCode
    1979072
  • Title

    Deanonymizing schemes of hidden services in tor network: A survey

  • Author

    Nepal, Sabita ; Dahal, Saurav ; Seokjoo Shin

  • Author_Institution
    Dept. of Comput. Eng., Chosun Univ., Gwangju, South Korea
  • fYear
    2015
  • fDate
    12-14 Jan. 2015
  • Firstpage
    468
  • Lastpage
    473
  • Abstract
    Tor hidden services are used to provide a TCP based service to users while not exposing the hidden server´s IP address so as to attain obscurity and anti-censorship. However, hidden services are abused in numerous ways. Hidden services are being misused for illegal services like pornography, drug trading information etc. For the sake of prevention and warning for misuse of Tor hidden services, studies on revealing hidden server´s identities are somewhat inevitable. In this paper, we give an overview over the existing attacking schemes, their comparisons, explain their key ideas and show their interrelations. Comparison study gives a guideline of deanonymizing hidden services in terms of simplicity and effectiveness.
  • Keywords
    IP networks; computer networks; transport protocols; TCP based service; Tor hidden services; Tor network; anticensorship; deanonymizing hidden services; deanonymizing schemes; drug trading information; hidden server IP address; illegal services; pornography; IP networks; Internet; Memory management; Protocols; Public key; Relays; Servers; Anonymity; Deanonymization; Hidden services; Tor network;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Networking (ICOIN), 2015 International Conference on
  • Conference_Location
    Cambodia
  • Type

    conf

  • DOI
    10.1109/ICOIN.2015.7057949
  • Filename
    7057949