A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Defending Tor from Network Adversaries: A Case Study of Network Path Prediction
2015
Proceedings on Privacy Enhancing Technologies
The Tor anonymity network has been shown vulnerable to traffic analysis attacks by autonomous systems (ASes) and Internet exchanges (IXes), which can observe different overlay hops belonging to the same circuit. We evaluate whether network path prediction techniques provide an accurate picture of the threat from such adversaries, and whether they can be used to avoid this threat. We perform a measurement study by collecting 17.2 million traceroutes from Tor relays to destinations around the
doi:10.1515/popets-2015-0021
dblp:journals/popets/JuenJDBC15
fatcat:hu3cmm7y7jf2lliqejb4xo333y