Search
Search Results
-
Forensics Analysis of TOR Browser
The Onion Router is a web browser that uses the Tor network to anonymize web traffic by making it simple to conceal one’s identity on social media.... -
Recognition of tor malware and onion services
The transformation of the contemporary societies through digital technologies has had a profound effect on all human activities including those that...
-
Tor network anonymity evaluation based on node anonymity
In order to address the shortcomings of traditional anonymity network anonymity evaluation methods, which only analyze from the perspective of the...
-
Onion under Microscope: An in-depth analysis of the Tor Web
Tor is an open source software that allows accessing various kinds of resources, known as hidden services, while guaranteeing sender and receiver...
-
Survey on Bridge Discovery in Tor
To prevent users from using Tor for anonymous communication, many regulatory agencies have blocked the IP addresses of public Tor routers in Tor... -
MACT: A multi-channel anonymous consensus based on Tor
As the core of blockchain technology, consensus mechanism determines the security, stability and availability of the system. Most of consensus...
-
A first look at references from the dark to the surface web world: a case study in Tor
Tor is the most well-known anonymity network that protects the identity of both content providers and their clients against any tracking on the...
-
Evaluation of Circuit Lifetimes in Tor
Tor is a popular anonymity network which achieves its anonymity by constructing paths over three Tor relays, so-called circuits. Multiple streams... -
Approach to Recognition of Malicious Servers of TOR Anonymization Network Based on Cluster Analysis
AbstractProblems of secure communications on the Internet and anonymous access to network resources are considered. A problem is revealed, which...
-
Improving the Privacy of Tor Onion Services
Onion services enable bidirectional anonymity for parties that communicate over the Tor network, thus providing improved privacy properties compared... -
Sample Terms of Reference (TOR)
XXX XX All... -
Traffic Correlation for Deanonymizing Cryptocurrency Wallet Through Tor
Cryptocurrencies have increasingly become the preferred choice for private transactions due to their anonymity and decentralized features. When a... -
Zoomer: A Website Fingerprinting Attack Against Tor Hidden Services
The deanonymization of Tor hidden services (HS) is the top priority for dark web governance. Thanks to the leap of artificial intelligence... -
Darknet (Tor) Accessing Identification System Using Deep-Wide Cross Network
Many organizations and researchers are interested in intrusion detection as one of their extensive research interests. Despite some progress, some... -
Forensic investigation of the dark web on the Tor network: pathway toward the surface web
The Dark Web is notorious for being a huge marketplace that promotes illegal products such as indecent images of children, drug, private data, and...
-
Watermark Based Tor Cross-Domain Tracking System for Tor Network Traceback
Anonymous network is widely used to access the Internet, causing varieties of cyber security incidents because of its anonymity, which increasingly... -
Identification of MEEK-Based TOR Hidden Service Access Using the Key Packet Sequence
Tor enables end user the desirable cyber anonymity with obfuscation technologies like MEEK. However, it has also manifested itself a wide shield for... -
DNS-Morph: UDP-Based Bootstrap** Protocol for Tor
Tor is a popular system for anonymous communication and censorship circumvention on the web, this puts Tor as a target for attacks by organizations...