{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T04:02:23Z","timestamp":1747368143737,"version":"3.40.5"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031928857","type":"print"},{"value":"9783031928864","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-92886-4_13","type":"book-chapter","created":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T06:12:53Z","timestamp":1747289573000},"page":"189-204","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Impact Analysis of\u00a0Sybil Attacks in\u00a0the\u00a0Tor Network"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3766-783X","authenticated-orcid":false,"given":"Christoph","family":"Sendner","sequence":"first","affiliation":[]},{"given":"Dominik","family":"Schreider","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5637-7016","authenticated-orcid":false,"given":"Alexandra","family":"Dmitrienko","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,16]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Bauer, K., McCoy, D., Grunwald, D., Kohno, T., Sicker, D.: Low-resource routing attacks against Tor. In: ACM WPES (2007)","DOI":"10.1145\/1314333.1314336"},{"key":"13_CR2","unstructured":"Borisov, N.: Computational puzzles as Sybil defenses. In: IEEE P2P (2006)"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Cai, X., Zhang, X.C., Joshi, B., Johnson, R.: Touching from a distance: website fingerprinting attacks and defenses. In: ACM CCS (2012)","DOI":"10.1145\/2382196.2382260"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Douceur, J.J.: The Sybil attack. In: IPTPS (2002)","DOI":"10.1007\/3-540-45748-8_24"},{"key":"13_CR5","unstructured":"Evers, B., et al.: Thirteen years of Tor attacks. https:\/\/github.com\/Attacks-on-Tor\/Attacks-on-Tor\/blob\/master\/README.md"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"He, G., Yang, M., Gu, X., Luo, J., Ma, Y.: A novel active website fingerprinting attack against tor anonymous system. In: IEEE CSCWD (2014)","DOI":"10.1109\/CSCWD.2014.6846826"},{"key":"13_CR7","unstructured":"Houmansadr, A., Borisov, N.: SWIRL: a scalable watermark to detect correlated network flows. In: CCS (2018)"},{"key":"13_CR8","unstructured":"Houmansadr, A., Kiyavash, N., Borisov, N.: RAINBOW: a robust and invisible non-blind watermark for network flows. In: NDSS (2009)"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Jansen, R., Ju\u00e1rez, M., Galvez, R., Elahi, T., D\u00edaz, C.: Inside job: applying traffic analysis to measure tor from within. In: NDSS (2018)","DOI":"10.14722\/ndss.2018.23261"},{"key":"13_CR10","unstructured":"Jansen, R., Newsome, J., Wails, R.: Co-opting Linux processes for high-performance network simulation. In: USENIX ATC (2022)"},{"key":"13_CR11","unstructured":"Jansen, R., Tracey, J., Goldberg, I.: Once is never enough: foundations for sound statistical inference in Tor network experimentation. In: USENIX Security (2021)"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Johnson, A., Jansen, R., Hopper, N., Segal, A., Syverson, P.: Peerflow: secure load balancing in tor. In: PoPETs (2017)","DOI":"10.1515\/popets-2017-0017"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Johnson, A., Wacek, C., Jansen, R., Sherr, M., Syverson, P.: Users get routed: traffic correlation on tor by realistic adversaries. In: CCS (2013)","DOI":"10.1145\/2508859.2516651"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Juarez, M., Afroz, S., Acar, G., Diaz, C., Greenstadt, R.: A critical evaluation of website fingerprinting attacks. In: CCS (2014)","DOI":"10.1145\/2660267.2660368"},{"key":"13_CR15","unstructured":"Klimas, M.: How do ISPs block sites & how to access them anyway (2022). https:\/\/surfshark.com\/blog\/how-do-isps-block-sites"},{"key":"13_CR16","unstructured":"Koppen, G., F\u00e6r\u00f8y, A.: Anonymity loves Diversity: The Case of Tor (2020). https:\/\/foss-north.se\/2020ii\/slides\/tor_diversity_foss2020.pdf"},{"key":"13_CR17","unstructured":"Levine, B., Shields, C., Margolin, N.: A survey of solutions to the Sybil attack. In: Proceedings of the Technical Report of Univ of Massachussets Amherst (2005)"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Lobo, A., Mandekar, Y., Pundpal, S., Roy, B.: Detection of Sybil attacks in social networks. In: CSoNet (2020)","DOI":"10.1007\/978-3-030-66046-8_30"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Nasr, M., Bahramali, A., Houmansadr, A.: DeepCorr: strong flow correlation attacks on tor using deep learning. In: CCS (2018)","DOI":"10.1145\/3243734.3243824"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Nithyanand, R., Starov, O., Zair, A., Gill, P., Schapira, M.: Measuring and mitigating AS-level adversaries against Tor. In: NDSS (2015)","DOI":"10.14722\/ndss.2016.23322"},{"key":"13_CR21","unstructured":"NullHypothesis: Sybilhunter GitHub Repository. https:\/\/github.com\/NullHypothesis\/sybilhunter"},{"key":"13_CR22","unstructured":"Nusenu: OrNet Stats. https:\/\/nusenu.github.io\/OrNetStats\/"},{"key":"13_CR23","unstructured":"Nusenu: Tor-Relay-Operator-IDs-Trust-Information. https:\/\/nusenu.github.io\/tor-relay-operator-ids-trust-information\/"},{"key":"13_CR24","unstructured":"Nusenu: Is KAX17 performing deanonymization Attacks against Tor Users? (2021). https:\/\/nusenu.medium.com\/is-kax17-performing-de-anonymization-attacks-against-tor-users-42e566defce8"},{"key":"13_CR25","doi-asserted-by":"crossref","unstructured":"Overlier, L., Syverson, P.: Locating hidden servers. In: IEEE S &P (2006)","DOI":"10.1109\/SP.2006.24"},{"key":"13_CR26","unstructured":"Project, T.: Directory Specification. https:\/\/gitlab.torproject.org\/tpo\/core\/torspec\/-\/blob\/HEAD\/dir-spec.txt#L3145"},{"key":"13_CR27","unstructured":"Project, T.: Relay Requirements. https:\/\/community.torproject.org\/relay\/relays-requirements\/"},{"key":"13_CR28","unstructured":"Project, T.: Research safety board. https:\/\/research.torproject.org\/safetyboard\/"},{"key":"13_CR29","unstructured":"Project, T.: Tor metrics. https:\/\/metrics.torproject.org"},{"key":"13_CR30","unstructured":"Project, T.: Tor Specification. https:\/\/github.com\/torproject\/torspec\/blob\/main\/"},{"key":"13_CR31","doi-asserted-by":"crossref","unstructured":"Sendner, C., Stang, J., Dmitrienko, A., Wijewickrama, R., Jadliwala, M.: Tormult: introducing a novel tor bandwidth inflation attack. Preprint, arXiv (2023)","DOI":"10.14722\/ndss.2024.241133"},{"key":"13_CR32","doi-asserted-by":"crossref","unstructured":"Sendner, C., Stang, J., Dmitrienko, A., Wijewickrama, R., Jadliwala, M.: Mirageflow: a new bandwidth inflation attack on tor. In: NDSS (2024)","DOI":"10.14722\/ndss.2024.241133"},{"key":"13_CR33","doi-asserted-by":"crossref","unstructured":"Sui, J., Guo, W., Shi, X., Zhang, S., Hu, H.: Refining node similarity analysis: an optimized nearest-neighbor ranking algorithm. In: IEEE ICCECT (2024)","DOI":"10.1109\/ICCECT60629.2024.10545958"},{"key":"13_CR34","doi-asserted-by":"crossref","unstructured":"Sun, Y., Edmundson, A., Feamster, N., Chiang, M., Mittal, P.: Counter-RAPTOR: safeguarding tor against active routing attacks. In: IEEE S &P (2017)","DOI":"10.1109\/SP.2017.34"},{"key":"13_CR35","unstructured":"Sun, Y., et al.: $${RAPTOR}$$: routing attacks on privacy in tor. In: USENIX Security (2015)"},{"key":"13_CR36","doi-asserted-by":"crossref","unstructured":"Swathi, P., Modi, C., Patel, D.: Preventing Sybil attack in blockchain using distributed behavior monitoring of miners. In: ICCCNT (2019)","DOI":"10.1109\/ICCCNT45670.2019.8944507"},{"key":"13_CR37","unstructured":"Team, S.: Shadow - Network Simulator. https:\/\/shadow.github.io"},{"key":"13_CR38","unstructured":"Team, S.: Tornettools. https:\/\/github.com\/shadow\/tornettools"},{"key":"13_CR39","unstructured":"Tor: The Tor Project. https:\/\/www.torproject.org\/"},{"key":"13_CR40","doi-asserted-by":"crossref","unstructured":"Trifa, Z., Khemakhem, M.: Sybil nodes as a mitigation strategy against Sybil attack. Procedia Computer Science, ANT, SEIT (2014)","DOI":"10.1016\/j.procs.2014.05.544"},{"key":"13_CR41","doi-asserted-by":"crossref","unstructured":"Wan, G., Johnson, A., Wails, R., Wagh, S., Mittal, P.: Guard placement attacks on path selection algorithms for Tor. PoPETs (2019)","DOI":"10.2478\/popets-2019-0069"},{"key":"13_CR42","doi-asserted-by":"crossref","unstructured":"Wang, T., Goldberg, I.: Improved website fingerprinting on Tor. In: WPES (2013)","DOI":"10.1145\/2517840.2517851"},{"key":"13_CR43","unstructured":"Winter, P., Ensafi, R., Loesing, K., Feamster, N.: Identifying and characterizing Sybils in the Tor network. In: USENIX Security (2016)"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-92886-4_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T06:13:12Z","timestamp":1747289592000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-92886-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031928857","9783031928864"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-92886-4_13","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"16 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Maribor","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Slovenia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 May 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 May 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"40","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sec2025.um.si\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}