SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Shining Light in Dark Places: Understanding the Tor Network
PETS '08 Proceedings of the 8th international symposium on Privacy Enhancing Technologies
Performance Measurements and Statistics of Tor Hidden Services
SAINT '08 Proceedings of the 2008 International Symposium on Applications and the Internet
Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
Sampled traffic analysis by internet-exchange-level adversaries
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
Performance comparison of low-latency anonymisation services from a user perspective
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
One bad apple spoils the bunch: exploiting P2P applications to trace and profile Tor users
LEET'11 Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats
An analysis of anonymity technology usage
TMA'11 Proceedings of the Third international conference on Traffic monitoring and analysis
ExperimenTor: a testbed for safe and realistic tor experimentation
CSET'11 Proceedings of the 4th conference on Cyber security experimentation and test
Tor and circumvention: lessons learned
CRYPTO'11 Proceedings of the 31st annual conference on Advances in cryptology
TMA'12 Proceedings of the 4th international conference on Traffic Monitoring and Analysis
Enforced community standards for research on users of the tor anonymity network
FC'11 Proceedings of the 2011 international conference on Financial Cryptography and Data Security
Methodically modeling the Tor network
CSET'12 Proceedings of the 5th USENIX conference on Cyber Security Experimentation and Test
A bird's eye view on the I2P anonymous file-sharing environment
NSS'12 Proceedings of the 6th international conference on Network and System Security
Review: An overview of anonymity technology usage
Computer Communications
Hi-index | 0.00 |
The Tor network is one of the largest deployed anonymity networks, consisting of 1500+ volunteer-run relays and probably hundreds of thousands of clients connecting every day. Its large user-base has made it attractive for researchers to analyze usage of a real deployed anonymity network. The recent growth of the network has also led to performance problems, as well as attempts by some governments to block access to the Tor network. Investigating these performance problems and learning about network blocking is best done by measuring usage data of the Tor network. However, analyzing a live anonymity system must be performed with great care, so that the users' privacy is not put at risk. In this paper we present a case study of measuring two different types of sensitive data in the Tor network: countries of connecting clients, and exiting traffic by port. Based on these examples we derive general guidelines for safely measuring potentially sensitive data, both in the Tor network and in other anonymity networks.