{"title":"A mapping study on the behavirol analysis of Tor relay protocol","authors":"Ayşe Bilge İnce, M. Aktaş","doi":"10.1109/UBMK.2017.8093391","DOIUrl":null,"url":null,"abstract":"Tor, uses a protocol aimed at ensuring anonymity by distributing its communication over relays all over the world. This protocol designed to protect the privacy of Internet users from traffic analysis attacks launched by an adversary. The studies in the literature have shown that some attacks can be performed in the hidden service relays, or in exit nodes of services by eliminating anonimity. In this paper, a mapping study is conducted among the publications in the literature on Tor Service Protocol behavioral analysis and the results are reported.","PeriodicalId":201903,"journal":{"name":"2017 International Conference on Computer Science and Engineering (UBMK)","volume":"250 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Computer Science and Engineering (UBMK)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/UBMK.2017.8093391","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Tor, uses a protocol aimed at ensuring anonymity by distributing its communication over relays all over the world. This protocol designed to protect the privacy of Internet users from traffic analysis attacks launched by an adversary. The studies in the literature have shown that some attacks can be performed in the hidden service relays, or in exit nodes of services by eliminating anonimity. In this paper, a mapping study is conducted among the publications in the literature on Tor Service Protocol behavioral analysis and the results are reported.