@inproceedings{2cf4c6cbd9fc499a8437b816fd638e7e,
title = "The Research of Attacking TOR Network Users",
abstract = "Tor anonymous network is to protect the privacies of the users in the Internet. In this paper, our goal is to research what potential security risks and vulnerabilities we will encounter when using Tor anonymous network. We try to find some determined results from the perspective of an attacker. Using the system architecture of Tor anonymous network and combining the concept of man-in-the-middle (MITM) attack, we design a system for experiments to instigate the attacks in practice. Finally, we discuss and analyze the potential security threats and risks of using Tor anonymous network based on our results of experiments.",
keywords = "Anonymity network, Botnet, Man-in-the-middle attack, Tor",
author = "Huang, {Yu Wei} and Lee, {Chia Hao} and Hsu, {Fu Hau}",
note = "Publisher Copyright: {\textcopyright} Springer Nature Switzerland AG 2020.; 3rd International Conference on Security with Intelligent Computing and Big-data Services, SICBS 2019 ; Conference date: 04-12-2019 Through 06-12-2019",
year = "2020",
doi = "10.1007/978-3-030-46828-6_4",
language = "???core.languages.en_GB???",
isbn = "9783030468279",
series = "Advances in Intelligent Systems and Computing",
publisher = "Springer",
pages = "35--38",
editor = "Jain, {Lakhmi C.} and Sheng-Lung Peng and Shiuh-Jeng Wang",
booktitle = "Security with Intelligent Computing and Big-Data Services 2019 - Proceedings of the 3rd International Conference on Security with Intelligent Computing and Big-data Services SICBS",
}