Journal on Communications ›› 2015, Vol. 36 ›› Issue (2): 80-87.doi: 10.11959/j.issn.1000-436x.2015036

• Academic papers • Previous Articles     Next Articles

Measuring and analyzing node families in the Tor anonymous communication network

Xiao WANG1,2,3,4,5,Bin-xing FANG1,2,4,Pei-peng LIU1,2,3,4,Li2 GUO2,4,Jin-qiao SHI2,4   

  1. 1 Institute of Computing Technology,Chinese Academy of Sciences,Beijing 100190,China
    2 Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093,China
    3 Graduated University of Chinese Academy of Sciences,Beijing 100190,China
    4 Chinese National Engineering Laboratory for Information Security Technologies,Beijing 100093,China
    5 National Computer Network Emergency Response Technical Team/Coordination Center,100029,China
  • Online:2015-02-25 Published:2017-06-27
  • Supported by:
    The National High Technology Research and Development Program of China (863 Program);The National High Technology Research and Development Program of China (863 Program);The National Natural Science Foundation of China;The National Key Technology R&D Program;The National Key Technology R&D Program

Abstract:

Tor family was focused on design and given a family-level measurement of it.Based on Tor node families (over 3000) discovered from live Tor network data (from Jan.2011 to Dec.2012),a few characteristics of Tor node families were revealed,such as family size,bandwidth,geographical distribution as well as operators providing a few big families.The analysis validated the irreplaceable role played by family design in enhancing Tor’s anonymity.Based on the measurement,security analysis showed the serious availability threat a compromised node family can cause to the Tor network.Besides,It also discussed Tor hidden families and the potential anonymity risk caused by them.

Key words: Tor, anonymous communication, node family; harvesting attack, measurement, hidden family

No Suggested Reading articles found!