E-mail

E-mail a Wiley Online Library Link

Sami Zhioua Tor traffic analysis using Hidden Markov Models Security and Communication Networks 6

Version of Record online: 12 OCT 2012 | DOI: 10.1002/sec.669

Thumbnail image of graphical abstract

Tor is the most popular tool providing anonymity online. The paper studies a common threat model where an attacker in the same LAN as the victim tries to defeat the anonymity of Tor. Using Hidden Markov Models, we show that a local attacker can identify the hops forming circuits initiated by the Tor client victim with an acceptable probability of 50 %.

Complete the form below and we will send an e-mail message containing a link to the selected article on your behalf

Required = Required Field

SEARCH