Cracking the Dark Web: Attacks in Tor Network. Bansal, G., Chamola, V., Jolfaei, A., & Mumtaz, S. IEEE Network Magazine, IEEE, Revision. abstract bibtex Tor or "The Onion Router" is one of the most popular, secure, and widely used anonymous routing systems. It is the backbone behind the emergence of the dark web. As a second-generation onion routing system, Tor’s users are protected from any censorship and assures complete anonymity. Tor is based on a worldwide network of relays operated by volunteers around the globe. Tor remains one of the most popular and secure tools against network surveillance, traffic analysis, and information censorship due to its strong employment of encryption, authentication, and routing protocols. With the growing computational capabilities of adversaries, the question remains how long Tor would be able to sustain adversarial attacks and guarantee anonymity. In this paper, we present the foundation of the Tor network, it’s working, the possible attacks against Tor, and the network’s defense strategies. Also, we present a case study on a proposed deep learning framework that employs bandwidth performance to identify the server’s location in the Tor network. This paper underlines the current status and future ahead with the use of Tor’s network.
@article{Tor,
title={Cracking the Dark Web: Attacks in Tor Network},
author={Bansal, Gaurang and Chamola, Vinay and Jolfaei, Alireza and Mumtaz, Shahid},
journal={IEEE Network Magazine},
publisher={IEEE},
year={Revision},
abstract={
Tor or "The Onion Router" is one of the most popular, secure, and widely used anonymous routing systems.
It is the backbone behind the emergence of the dark web. As a
second-generation onion routing system, Tor’s users are protected
from any censorship and assures complete anonymity. Tor is
based on a worldwide network of relays operated by volunteers
around the globe. Tor remains one of the most popular and
secure tools against network surveillance, traffic analysis, and
information censorship due to its strong employment of encryption, authentication, and routing protocols. With the growing computational capabilities of adversaries, the question remains
how long Tor would be able to sustain adversarial attacks and
guarantee anonymity. In this paper, we present the foundation
of the Tor network, it’s working, the possible attacks against
Tor, and the network’s defense strategies. Also, we present a
case study on a proposed deep learning framework that employs
bandwidth performance to identify the server’s location in the
Tor network. This paper underlines the current status and future
ahead with the use of Tor’s network.
}
}
Downloads: 0
{"_id":"qcjdyNWKXKpgxnFiN","bibbaseid":"bansal-chamola-jolfaei-mumtaz-crackingthedarkwebattacksintornetwork-revision","author_short":["Bansal, G.","Chamola, V.","Jolfaei, A.","Mumtaz, S."],"bibdata":{"bibtype":"article","type":"article","title":"Cracking the Dark Web: Attacks in Tor Network","author":[{"propositions":[],"lastnames":["Bansal"],"firstnames":["Gaurang"],"suffixes":[]},{"propositions":[],"lastnames":["Chamola"],"firstnames":["Vinay"],"suffixes":[]},{"propositions":[],"lastnames":["Jolfaei"],"firstnames":["Alireza"],"suffixes":[]},{"propositions":[],"lastnames":["Mumtaz"],"firstnames":["Shahid"],"suffixes":[]}],"journal":"IEEE Network Magazine","publisher":"IEEE","year":"Revision","abstract":"Tor or \"The Onion Router\" is one of the most popular, secure, and widely used anonymous routing systems. It is the backbone behind the emergence of the dark web. As a second-generation onion routing system, Tor’s users are protected from any censorship and assures complete anonymity. Tor is based on a worldwide network of relays operated by volunteers around the globe. Tor remains one of the most popular and secure tools against network surveillance, traffic analysis, and information censorship due to its strong employment of encryption, authentication, and routing protocols. With the growing computational capabilities of adversaries, the question remains how long Tor would be able to sustain adversarial attacks and guarantee anonymity. In this paper, we present the foundation of the Tor network, it’s working, the possible attacks against Tor, and the network’s defense strategies. Also, we present a case study on a proposed deep learning framework that employs bandwidth performance to identify the server’s location in the Tor network. This paper underlines the current status and future ahead with the use of Tor’s network. ","bibtex":"@article{Tor,\n title={Cracking the Dark Web: Attacks in Tor Network},\n author={Bansal, Gaurang and Chamola, Vinay and Jolfaei, Alireza and Mumtaz, Shahid},\n journal={IEEE Network Magazine},\n publisher={IEEE},\n year={Revision},\n abstract={\n Tor or \"The Onion Router\" is one of the most popular, secure, and widely used anonymous routing systems.\nIt is the backbone behind the emergence of the dark web. As a\nsecond-generation onion routing system, Tor’s users are protected\nfrom any censorship and assures complete anonymity. Tor is\nbased on a worldwide network of relays operated by volunteers\naround the globe. Tor remains one of the most popular and\nsecure tools against network surveillance, traffic analysis, and\ninformation censorship due to its strong employment of encryption, authentication, and routing protocols. With the growing computational capabilities of adversaries, the question remains\nhow long Tor would be able to sustain adversarial attacks and\nguarantee anonymity. In this paper, we present the foundation\nof the Tor network, it’s working, the possible attacks against\nTor, and the network’s defense strategies. Also, we present a\ncase study on a proposed deep learning framework that employs\nbandwidth performance to identify the server’s location in the\nTor network. This paper underlines the current status and future\nahead with the use of Tor’s network.\n }\n}\n\n","author_short":["Bansal, G.","Chamola, V.","Jolfaei, A.","Mumtaz, S."],"key":"Tor","id":"Tor","bibbaseid":"bansal-chamola-jolfaei-mumtaz-crackingthedarkwebattacksintornetwork-revision","role":"author","urls":{},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"https://bibbase.org/f/HArBZApEudofoZrvQ/papers.bib","dataSources":["yEbGDMwDLfENqgbaq"],"keywords":[],"search_terms":["cracking","dark","web","attacks","tor","network","bansal","chamola","jolfaei","mumtaz"],"title":"Cracking the Dark Web: Attacks in Tor Network","year":null}