Cracking the Dark Web: Attacks in Tor Network. Bansal, G., Chamola, V., Jolfaei, A., & Mumtaz, S. IEEE Network Magazine, IEEE, Revision.
abstract   bibtex   
Tor or "The Onion Router" is one of the most popular, secure, and widely used anonymous routing systems. It is the backbone behind the emergence of the dark web. As a second-generation onion routing system, Tor’s users are protected from any censorship and assures complete anonymity. Tor is based on a worldwide network of relays operated by volunteers around the globe. Tor remains one of the most popular and secure tools against network surveillance, traffic analysis, and information censorship due to its strong employment of encryption, authentication, and routing protocols. With the growing computational capabilities of adversaries, the question remains how long Tor would be able to sustain adversarial attacks and guarantee anonymity. In this paper, we present the foundation of the Tor network, it’s working, the possible attacks against Tor, and the network’s defense strategies. Also, we present a case study on a proposed deep learning framework that employs bandwidth performance to identify the server’s location in the Tor network. This paper underlines the current status and future ahead with the use of Tor’s network.
@article{Tor,
  title={Cracking the Dark Web: Attacks in Tor Network},
  author={Bansal, Gaurang and Chamola, Vinay and Jolfaei, Alireza and Mumtaz, Shahid},
  journal={IEEE Network Magazine},
  publisher={IEEE},
  year={Revision},
  abstract={
    Tor or "The Onion Router" is one of the most popular, secure, and widely used anonymous routing systems.
It is the backbone behind the emergence of the dark web. As a
second-generation onion routing system, Tor’s users are protected
from any censorship and assures complete anonymity. Tor is
based on a worldwide network of relays operated by volunteers
around the globe. Tor remains one of the most popular and
secure tools against network surveillance, traffic analysis, and
information censorship due to its strong employment of encryption, authentication, and routing protocols. With the growing computational capabilities of adversaries, the question remains
how long Tor would be able to sustain adversarial attacks and
guarantee anonymity. In this paper, we present the foundation
of the Tor network, it’s working, the possible attacks against
Tor, and the network’s defense strategies. Also, we present a
case study on a proposed deep learning framework that employs
bandwidth performance to identify the server’s location in the
Tor network. This paper underlines the current status and future
ahead with the use of Tor’s network.
  }
}

Downloads: 0