{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:05:32Z","timestamp":1770224732944,"version":"3.49.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030053444","type":"print"},{"value":"9783030053451","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05345-1_3","type":"book-chapter","created":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T09:07:56Z","timestamp":1544173676000},"page":"33-45","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["DNS Traffic of a Tor Exit Node - An Analysis"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2506-2350","authenticated-orcid":false,"given":"Michael","family":"Sonntag","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,7]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of the 13th Conference on USENIX Security Symposium (SSYM 2004), vol. 13. USENIX Association, Berkeley (2004)","DOI":"10.21236\/ADA465464"},{"key":"3_CR2","unstructured":"Sonntag, M., Mayrhofer, R., H\u00f6rmanseder, R.: Technical and legal determinants of implementing a Tor exit node. In: 33rd GEANT Networking Conference - TNC17 (2017). \nhttps:\/\/tnc17.geant.org\/core\/presentation\/32"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Sonntag, M., Mayrhofer, R.: Traffic statistics of a high-bandwidth Tor exit node. In: Mori, P., Furnell, S., Camp, O. (eds.) Proceedings of 3rd International Conference on Information Systems Security and Privacy, pp. 270\u2013277. SCITEPRESS (2017)","DOI":"10.5220\/0006124202700277"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Greschbach, B., Pulls, T., Roberts, L.M., Winter, P., Feamster, N.: The effect of DNS on Tor\u2019s anonymity. In: NDSS 2017. Internet Society, San Diego (2017)","DOI":"10.14722\/ndss.2017.23311"},{"key":"3_CR5","unstructured":"Bortzmeyer, S.: DNS query name minimisation to improve privacy. RFC 7816. \nhttps:\/\/tools.ietf.org\/html\/rfc7816"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Jansen, R., Johnson, A.: Safely measuring Tor. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS 2016), pp. 1553\u20131567. ACM, New York (2016)","DOI":"10.1145\/2976749.2978310"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Pustogarov, I., Thill, F, Weinmann, R.-P.: Content and popularity analysis of Tor hidden services. In: ICDCSW 2014, Proceedings of the 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops, pp. 188\u2013193. IEEE, New York (2014)","DOI":"10.1109\/ICDCSW.2014.20"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Loesing, K., Sandmann, W., Wilms, C., Wirtz, G.: Performance measurements and statistics of Tor hidden services, applications and the internet. In: 2008 International Symposium on Applications and the Internet, SAINT 2008, pp. 1\u20137. IEEE, New York (2008)","DOI":"10.1109\/SAINT.2008.69"},{"issue":"12","key":"3_CR9","doi-asserted-by":"publisher","first-page":"2515","DOI":"10.1109\/TIFS.2015.2465934","volume":"10","author":"Z Ling","year":"2015","unstructured":"Ling, Z., Luo, J., Wu, K., Yu, W., Fu, X.: TorWard: discovery, blocking, and traceback of malicious traffic over Tor. IEEE Trans. Inf. Forensics Secur. 10(12), 2515\u20132530 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/978-3-319-08506-7_16","volume-title":"Privacy Enhancing Technologies","author":"P Winter","year":"2014","unstructured":"Winter, P., et al.: Spoiled onions: exposing malicious Tor exit relays. In: De Cristofaro, E., Murdoch, Steven J. (eds.) PETS 2014. LNCS, vol. 8555, pp. 304\u2013331. Springer, Cham (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-319-08506-7_16"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Johnson., A., Wacek, A., Jansen, R., Sherr, M., Syverson, P.: Users get routed: traffic correlation on tor by realistic adversaries. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security (CCS 2013), pp. 337\u2013348. ACM, New York (2013)","DOI":"10.1145\/2508859.2516651"},{"key":"3_CR12","unstructured":"Manils, P., Abdelberi, C., Blond, S.L., K\u00e2afar, M.A., Castelluccia, C., Legout, A., Dabbous, W.: Compromising Tor anonymity exploiting P2P information leakage. CoRR (2010). \narXiv:1004.1461"},{"key":"3_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1007\/978-3-642-23822-2_36","volume-title":"Computer Security\u2014ESORICS 2011","author":"H Federrath","year":"2011","unstructured":"Federrath, H., Fuchs, K.-P., Herrmann, D., Piosecny, C.: Privacy-preserving DNS: analysis of broadcast, range queries and mix-based protection methods. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 665\u2013683. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-23822-2_36"},{"key":"3_CR14","unstructured":"Alexa Top 1 Million. \nhttp:\/\/s3.amazonaws.com\/alexa-static\/top-1m.csv.zip"},{"key":"3_CR15","unstructured":"Shalla\u2019s Blacklists. \nhttp:\/\/www.shallalist.de\/"},{"key":"3_CR16","unstructured":"Black, S.: Unified Hosts File with Base Extensions. \nhttps:\/\/github.com\/StevenBlack\/hosts"},{"key":"3_CR17","unstructured":"Domaintools: Domain Count Statistics for TLDs. \nhttps:\/\/research.domaintools.com\/statistics\/tld-counts\/"},{"key":"3_CR18","unstructured":"Freedom House: Freedom on the Net 2017: Ukraine Country Profile. \nhttps:\/\/freedomhouse.org\/report\/freedom-net\/2017\/Ukraine"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05345-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T09:09:59Z","timestamp":1544173799000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05345-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030053444","9783030053451"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05345-1_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/space2018.cse.iitk.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}