Traffic Analysis Attacks on Tor: A Survey

  • Lamiaa Basyoni
  • , Noora Fetais
  • , Aiman Erbad
  • , Amr Mohamed
  • , Mohsen Guizani

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

46 Citations (Scopus)

Abstract

The Tor anonymity network is one of the most popular and widely used tools to protect the privacy of online users. Tor provides defenses against multiple adversarial activities aiming to identify or trace the users. Traffic analysis is a very strong tool that can be used for internet surveillance. Traffic analysis attacks against Tor's anonymity network has been known as an open question in research. Moreover, the low-latency feature Tor tries to provide to its users imposes limitations in defending against traffic analysis attacks. In our study, we examine traffic analysis attacks from the perspective of the adopted adversary model and how much it fits within Tor's threat model. The purpose of this study is to evaluate how practical these attacks are on real-time Tor network.

Original languageEnglish
Title of host publication2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies, ICIoT 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages183-188
Number of pages6
ISBN (Electronic)9781728148212
DOIs
Publication statusPublished - Feb 2020
Externally publishedYes
Event2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies, ICIoT 2020 - Doha, Qatar
Duration: 2 Feb 20205 Feb 2020

Publication series

Name2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies, ICIoT 2020

Conference

Conference2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies, ICIoT 2020
Country/TerritoryQatar
CityDoha
Period2/02/205/02/20

Keywords

  • Anonymity Network
  • Attacks
  • Security
  • Tor
  • Traffic Analysis

Fingerprint

Dive into the research topics of 'Traffic Analysis Attacks on Tor: A Survey'. Together they form a unique fingerprint.

Cite this