The Anonymity of the Dark Web: A Survey #02
This is my personal note about the paper introduction. https://www.researchgate.net/publication/359421382_The_Anonymity_of_the_Dark_Web_A_Survey
Background
Background information on the attack’s taxonomy in the dark web.
Related Work
- Salo proposed a survey and categorized 14 Tor attacks into five categories.
- Recent Attacks on Tor
- Nepal et al. presented Tor hidden services deanonymization scheme.
- Denonymizing schemes of hidden services in Tor network: A survey
- Erdin et al. presented a survey of attacks on I2P and Tor by categorizing almost 18 attacks.
- How to find hidden users: A survey of attacks on anonymity networks
- Yang et al. introduced single hop and multiple hop communication models and deanonymizing techniques in two dimension.
- De-anonymizing and counter-measures in anonymous communication networks
- Alsabah and Goldberg provided a survey on the Tor network’s performance and security aspects in different areas.
- Performance and security improvements for Tor: A survey
- Evers et al. presented a thirteen-year attack survey that classifies 84 attacks.
- Thirteen years of Tor attacks
- Saleh et al. presented a literature survey that deals with classification, quantification, and comparative analysis of research work on Tor.
- Shedding light on the dark corners of the internet: A survey of Tor research
- Cambiaso et al. analyzed the Tor attacks and categorized them as per the target of the attacker client, server, network, and generic attacks.
- Darknet security: A categorization of attacks to the Tor network
- Italian Conf. Cybersecur., vol. 2315, 2019, pp. 1–12
- Darknet security: A categorization of attacks to the Tor network
- Karunanayake et al. introduced 50 Tor deanonymization attacks in 2020 into four categories.
- ‘Anonymity with Tor: A survey on Tor attacks
- arXiv:2009.13018.
- ‘Anonymity with Tor: A survey on Tor attacks
- Sulaiman presented different types of unpopular Tor attacks.
- Attacking Tor through unpopular ports
- Sun et al. [20] discussed the raptor attacks which the autonomous system can launch to deanonymize the user.
- Raptor: Routing attacks on privacy in Tor
- 24th USENIX Secur. Symp., 2015, pp. 271–286
- Raptor: Routing attacks on privacy in Tor
- Barbera et al. discussed the methodology, accessing the resources, and effect of cell flood attacks on the Tor network.
- CellFlood: Attacking tor onion routers on the cheap
- Casenove and Miraglia analyzed the botnet’s infrastructure and how the botmasters use them in the Tor network.
- Botnet over Tor: The illusion of hiding
- Kaur and Randhawa also mentioned 11 Tor attacks in heir work but was unable to provide any attack categorization in the network.
- Dark web: A web of crimes
- Basyoni et al. examined traffic analysis attacks from the perspective of threat models and the practicality of these attacks in real-time.
- Traffic analysis attacks on Tor: A survey
In this paper analyzed and reviewed these work and have tried to simplify and unify various attacks and attack patterns.