DocumentCode
1979072
Title
Deanonymizing schemes of hidden services in tor network: A survey
Author
Nepal, Sabita ; Dahal, Saurav ; Seokjoo Shin
Author_Institution
Dept. of Comput. Eng., Chosun Univ., Gwangju, South Korea
fYear
2015
fDate
12-14 Jan. 2015
Firstpage
468
Lastpage
473
Abstract
Tor hidden services are used to provide a TCP based service to users while not exposing the hidden server´s IP address so as to attain obscurity and anti-censorship. However, hidden services are abused in numerous ways. Hidden services are being misused for illegal services like pornography, drug trading information etc. For the sake of prevention and warning for misuse of Tor hidden services, studies on revealing hidden server´s identities are somewhat inevitable. In this paper, we give an overview over the existing attacking schemes, their comparisons, explain their key ideas and show their interrelations. Comparison study gives a guideline of deanonymizing hidden services in terms of simplicity and effectiveness.
Keywords
IP networks; computer networks; transport protocols; TCP based service; Tor hidden services; Tor network; anticensorship; deanonymizing hidden services; deanonymizing schemes; drug trading information; hidden server IP address; illegal services; pornography; IP networks; Internet; Memory management; Protocols; Public key; Relays; Servers; Anonymity; Deanonymization; Hidden services; Tor network;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Networking (ICOIN), 2015 International Conference on
Conference_Location
Cambodia
Type
conf
DOI
10.1109/ICOIN.2015.7057949
Filename
7057949
Link To Document