Title
How to Find Hidden Users: A Survey of Attacks on Anonymity Networks
Abstract
Communication privacy has been a growing concern especially with the Internet becoming a major hub of our daily interactions. Revelations of government tracking and corporate profiling has resulted in increasing interest in anonymous communication mechanisms. Several systems have been developed with the aim of preserving communication privacy via unlinkability within a public network environment such as Tor and I2P. As the anonymity networks can not guarantee perfect anonymity, it is important for users to understand the risks they might face when utilizing such technologies. In this survey, we discuss potential attacks on the anonymity networks that can compromise user identities and communication links. We also summarize protection mechanisms against such attacks. Many attacks against anonymity networks are well studied and most of the modern systems have built-in mechanisms to prevent these attacks. Additionally, some of the attacks require considerable resources to be effective and hence are very unlikely to succeed against modern anonymity networks.
Year
DOI
Venue
2015
10.1109/COMST.2015.2453434
IEEE Communications Surveys and Tutorials
Keywords
Field
DocType
Anonymity,Anonymous Communication,Onion Routing,Privacy
Internet privacy,Computer security,Computer science,Profiling (computer programming),Server,Computer network,Encryption,Compromise,Anonymity,Privacy software,The Internet,Government
Journal
Volume
Issue
ISSN
PP
99
1553-877X
Citations 
PageRank 
References 
4
0.40
43
Authors
3
Name
Order
Citations
PageRank
Esra Erdin1212.90
Christopher Zachor240.40
Mehmet Hadi Günes314916.19