Sami Zhioua Tor traffic analysis using Hidden Markov Models Security and Communication Networks 6
Tor is the most popular tool providing anonymity online. The paper studies a common threat model where an attacker in the same LAN as the victim tries to defeat the anonymity of Tor. Using Hidden Markov Models, we show that a local attacker can identify the hops forming circuits initiated by the Tor client victim with an acceptable probability of 50 %.
Complete the form below and we will send an e-mail message containing a link to the selected article on your behalf