Criteria Affect the Security of TOR

Article Preview

Abstract:

TOR is a popular anonymous communication system nowadays. This article measures the security of TOR network by probability of disclosure communication relation between TOR user and his destination, and discusses some factors that influence it, finally gives a formula to express the relation among them. We also refer to TOR network archived directory information to evaluate the security level of TOR, and bring forward three advices for using TOR safely..

You might also be interested in these eBooks

Info:

Periodical:

Pages:

444-448

Citation:

Online since:

September 2012

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] G.W. van Blarkom J.J. Borking & J.G.E. Olk, Handbook of Privacy and Privacy-Enhancing Technologies, The Case of Intelligent Software Agents The Hague 2003 ISBN 90-74087-33-7, pp.33-42.

Google Scholar

[2] Roger Dingledine, Nick Mathewson, Paul Syverson. Tor: The Second-Generation Onion Router. Usenix Security 2004, (2004).

DOI: 10.21236/ada465464

Google Scholar

[3] Yang ZHANG Effective Attacks in the Tor Authentication Protocol Third International Conference on Network and System Security (2009).

DOI: 10.1109/nss.2009.94

Google Scholar

[4] Roger Dingledine, Nick Mathewson, Paul Syverson. Tor path specification. (2008).

Google Scholar

[5] Karsten Loesing, Measuring the Tor Network from Public Directory Information, Phil. Trans. Roy. Soc. London, vol. A247, p.529–551 (2009).

Google Scholar

[6] The 1000 most-visited sites on the web , on http: /www. google. com/adplanner/static/top1000.

Google Scholar

[7] Adam Back, Ulf M¨oller, and Anton Stiglic. Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems s. In Proceedings of the 4th International Workshop on Information Hiding(IHW) (London, UK, 2001), Springer-Verlag, p.245–257.

DOI: 10.1007/3-540-45496-9_18

Google Scholar