Search
Search Results
-
Zoomer: A Website Fingerprinting Attack Against Tor Hidden Services
The deanonymization of Tor hidden services (HS) is the top priority for dark web governance. Thanks to the leap of artificial intelligence... -
Recognition of tor malware and onion services
The transformation of the contemporary societies through digital technologies has had a profound effect on all human activities including those that...
-
Improving the Privacy of Tor Onion Services
Onion services enable bidirectional anonymity for parties that communicate over the Tor network, thus providing improved privacy properties compared... -
A first look at references from the dark to the surface web world: a case study in Tor
Tor is the most well-known anonymity network that protects the identity of both content providers and their clients against any tracking on the...
-
Onion under Microscope: An in-depth analysis of the Tor Web
Tor is an open source software that allows accessing various kinds of resources, known as hidden services, while guaranteeing sender and receiver...
-
Identification of MEEK-Based TOR Hidden Service Access Using the Key Packet Sequence
Tor enables end user the desirable cyber anonymity with obfuscation technologies like MEEK. However, it has also manifested itself a wide shield for... -
Tor network anonymity evaluation based on node anonymity
In order to address the shortcomings of traditional anonymity network anonymity evaluation methods, which only analyze from the perspective of the...
-
Provably Avoiding Geographic Regions for Tor’s Onion Services
Tor, a peer-to-peer anonymous communication system, is one of the most effective tools in providing free and open communication online. Many of the... -
Forensic investigation of the dark web on the Tor network: pathway toward the surface web
The Dark Web is notorious for being a huge marketplace that promotes illegal products such as indecent images of children, drug, private data, and...
-
Detecting Hidden Innovative Networks in Hacker Communities (Invited Talk)
Innovation networks have always been in the core of human wealth, because of their contribution to increased economic efficiency. Hacker communities... -
Supervised ranking approach to identify infLuential websites in the darknet
The anonymity and high security of the Tor network allow it to host a significant amount of criminal activities. Some Tor domains attract more...
-
Towards Comprehensive Security Analysis of Hidden Services Using Binding Guard Relays
Tor Hidden Service is a widely used tool designed to protect the anonymity of both client and server. In order to prevent the predecessor attacks,... -
Statistical and combinatorial analysis of the TOR routing protocol: structural weaknesses identified in the TOR network
In this paper, we present the results of a deep TOR routing protocol analysis from a statistical and combinatorial point of view. We have modelled...
-
Detection of Anonymised Traffic: Tor as Case Study
This work studies Tor, an anonymous overlay network used to browse the Internet. Apart from its main purpose, this open-source project has gained... -
Protecting Privacy and Security Using Tor and Blockchain and De-anonymization Risks
The huge increase in data usage and the rapid development of new technologies such as cloud, IoT, and has also led to the exponential increase in... -
Anonymously Publishing Liveness Signals with Plausible Deniability
Sometimes entities have to prove to others that they are still alive at a certain point in time, but with the added requirements of anonymity and... -
COMPARISON OF CYBER ATTACKS ON SERVICES IN THE CLEARNET AND DARKNET
Cyber attacks on clearnet services are discussed widely in the research literature. However, a systematic comparison of cyber attacks on clearnet and... -
Seq2Path: a sequence-to-path-based flow feature fusion approach for encrypted traffic classification
With the increasing awareness of user privacy protection and communication security, encrypted traffic has increased dramatically. Usually utilizing...
-
What Is Hidden Behind the Term “Blockchain”?
We now know about the basic challenges facing the secure use of decentralized systems, and, by way of an example, have seen what has made blockchain... -
IoT workload offloading efficient intelligent transport system in federated ACNN integrated cooperated edge-cloud networks
Intelligent transport systems (ITS) provide various cooperative edge cloud services for roadside vehicular applications. These applications offer...