Title :
Deanonymizing schemes of hidden services in tor network: A survey
Author :
Nepal, Sabita ; Dahal, Saurav ; Seokjoo Shin
Author_Institution :
Dept. of Comput. Eng., Chosun Univ., Gwangju, South Korea
Abstract :
Tor hidden services are used to provide a TCP based service to users while not exposing the hidden server´s IP address so as to attain obscurity and anti-censorship. However, hidden services are abused in numerous ways. Hidden services are being misused for illegal services like pornography, drug trading information etc. For the sake of prevention and warning for misuse of Tor hidden services, studies on revealing hidden server´s identities are somewhat inevitable. In this paper, we give an overview over the existing attacking schemes, their comparisons, explain their key ideas and show their interrelations. Comparison study gives a guideline of deanonymizing hidden services in terms of simplicity and effectiveness.
Keywords :
IP networks; computer networks; transport protocols; TCP based service; Tor hidden services; Tor network; anticensorship; deanonymizing hidden services; deanonymizing schemes; drug trading information; hidden server IP address; illegal services; pornography; IP networks; Internet; Memory management; Protocols; Public key; Relays; Servers; Anonymity; Deanonymization; Hidden services; Tor network;
Conference_Titel :
Information Networking (ICOIN), 2015 International Conference on
Conference_Location :
Cambodia
DOI :
10.1109/ICOIN.2015.7057949