Skip to main content
Log in

Approach to Recognition of Malicious Servers of TOR Anonymization Network Based on Cluster Analysis

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

Problems of secure communications on the Internet and anonymous access to network resources are considered. A problem is revealed, which involves an increase in the probability of deanonymization of TOR network users when using the servers under common administrative control in one chain. An approach to recognition of “hidden groups” of servers of TOR anonymization network through analysis of the server characteristics frequency and their clustering based on similarity is suggested. These studies demonstrate the approaches to improve software of the TOR anonymization network and increase user security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.
Fig. 2.
Fig. 3.
Fig. 4.
Fig. 5.
Fig. 6.

Similar content being viewed by others

REFERENCES

  1. OrNetRadar. https://nusenu.github.io/OrNetRadar. Cited May 15, 2020.

  2. Specification of Tor protocol: Official website. https://gitweb.torproject.org/torspec.git. Cited May 15, 2020.

  3. Chakravarty, S., Traffic analysis attacks and defenses in low latency anonymous communications, PhD Thesis, New York: Columbia University, 2014.

  4. Dingledine, R., Mathewson, N., and Syverson, P., Tor: The second-generation onion router, Onion Router. http://www.onion-router.net/Publications/tor-desingn.pdf. Cited May 15, 2020.

  5. Collection of characteristics of nodes of Tor network. http://collector.torproject.org. Cited May, 2020.

  6. Eremeev, M.A., Nefedov, V.S., Ostrovsky, A.S., and Semchenkov, D.A., Approach to detect DNS-based covert channels by identifying beacon signals, Probl. Inf. Bezop. Komp’yut. Sist., 2020, no. 3, pp. 40–49.

  7. Latypov, I.T. and Eremeev, M.A., Multilevel model of computer attack based on attributive metagraphs, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp. 944–948.  https://doi.org/10.3103/S0146411620080192

    Article  Google Scholar 

  8. Zegzhda, D., Zegzhda, P., Pechenkin, A., and Poltavtseva, M., Modeling of information systems to their security evaluation, Proc. 10th Int. Conf. on Security of Information and Networks, Jaipur, India, 2017, New York: Association for Computing Machinery, 2017, pp. 295–298.  https://doi.org/10.1145/3136825.3136857

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to V. S. Nefedov or M. A. Eremeev.

Ethics declarations

The authors declare that they have no conflicts of interest.

Additional information

Translated by A. Muravev

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Nefedov, V.S., Kriulin, A.A. & Eremeev, M.A. Approach to Recognition of Malicious Servers of TOR Anonymization Network Based on Cluster Analysis. Aut. Control Comp. Sci. 55, 1209–1214 (2021). https://doi.org/10.3103/S0146411621080411

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411621080411

Keywords:

Navigation