The Research of Attacking TOR Network Users

Yu Wei Huang, Chia Hao Lee, Fu Hau Hsu

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Tor anonymous network is to protect the privacies of the users in the Internet. In this paper, our goal is to research what potential security risks and vulnerabilities we will encounter when using Tor anonymous network. We try to find some determined results from the perspective of an attacker. Using the system architecture of Tor anonymous network and combining the concept of man-in-the-middle (MITM) attack, we design a system for experiments to instigate the attacks in practice. Finally, we discuss and analyze the potential security threats and risks of using Tor anonymous network based on our results of experiments.

Original languageEnglish
Title of host publicationSecurity with Intelligent Computing and Big-Data Services 2019 - Proceedings of the 3rd International Conference on Security with Intelligent Computing and Big-data Services SICBS
EditorsLakhmi C. Jain, Sheng-Lung Peng, Shiuh-Jeng Wang
PublisherSpringer
Pages35-38
Number of pages4
ISBN (Print)9783030468279
DOIs
StatePublished - 2020
Event3rd International Conference on Security with Intelligent Computing and Big-data Services, SICBS 2019 - New Taipei City, Taiwan
Duration: 4 Dec 20196 Dec 2019

Publication series

NameAdvances in Intelligent Systems and Computing
Volume1145 AISC
ISSN (Print)2194-5357
ISSN (Electronic)2194-5365

Conference

Conference3rd International Conference on Security with Intelligent Computing and Big-data Services, SICBS 2019
Country/TerritoryTaiwan
CityNew Taipei City
Period4/12/196/12/19

Keywords

  • Anonymity network
  • Botnet
  • Man-in-the-middle attack
  • Tor

Fingerprint

Dive into the research topics of 'The Research of Attacking TOR Network Users'. Together they form a unique fingerprint.

Cite this