1 Hit in 1.0 sec

TorScan: Tracing Long-Lived Connections and Differential Scanning Attacks [chapter]

Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann
2012 Lecture Notes in Computer Science  
If an attacker gains access to the topological information about the Tor network instead of having to consider the network as a fully connected graph, this anonymity may be reduced.  ...  We demonstrate how the resulting leakage of the Tor network topology can be used and present attacks to trace back a user from an exit relay to a small set of potential entry nodes.  ...  Based on this, we described several novel attacks that use this information to deanonymize the entry points of the users into the Tor network.  ... 
doi:10.1007/978-3-642-33167-1_27 fatcat:7vsfmgdp5ndehe65igck6voajy