{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:56:01Z","timestamp":1743083761855,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319288642"},{"type":"electronic","value":"9783319288659"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-28865-9_20","type":"book-chapter","created":{"date-parts":[[2016,1,23]],"date-time":"2016-01-23T03:40:02Z","timestamp":1453520402000},"page":"367-384","source":"Crossref","is-referenced-by-count":1,"title":["Enhancing Traffic Analysis Resistance for Tor Hidden Services with Multipath Routing"],"prefix":"10.1007","author":[{"given":"Lei","family":"Yang","sequence":"first","affiliation":[]},{"given":"Fengjun","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-642-39077-7_8","volume-title":"Privacy Enhancing Technologies","author":"M AlSabah","year":"2013","unstructured":"AlSabah, M., Bauer, K., Elahi, T., Goldberg, I.: The path less travelled: overcoming Tor\u2019s bottlenecks with traffic splitting. In: De Cristofaro, E., Wright, M. (eds.) PETS 2013. LNCS, vol. 7981, pp. 143\u2013163. Springer, Heidelberg (2013)"},{"key":"20_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/978-3-642-22263-4_8","volume-title":"Privacy Enhancing Technologies","author":"M AlSabah","year":"2011","unstructured":"AlSabah, M., Bauer, K., Goldberg, I., Grunwald, D., McCoy, D., Savage, S., Voelker, G.M.: DefenestraTor: throwing out windows in Tor. In: Fischer-H\u00fcbner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 134\u2013154. Springer, Heidelberg (2011)"},{"key":"20_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/3-540-44702-4_7","volume-title":"Designing Privacy Enhancing Technologies","author":"O Berthold","year":"2001","unstructured":"Berthold, O., Federrath, H., K\u00f6psell, S.: Web MIXes: a system for anonymous and unobservable internet access. In: Federrath, H. (ed.) Anonymity 2000. LNCS, vol. 2009, pp. 115\u2013129. Springer, Heidelberg (2001)"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Pustogarov, I., Weinmann, R.: Trawling for Tor hidden services: detection, measurement, deanonymization. In: 2013 IEEE Symposium on Security and Privacy (SP), pp. 80\u201394. IEEE (2013)","DOI":"10.1109\/SP.2013.15"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proc. of the 13th USENIX Security Symposium (2004)","DOI":"10.21236\/ADA465464"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Elahi, T., Bauer, K., AlSabah, M., Dingledine, R., Goldberg, I.: Changing of the guards: a framework for understanding and improving entry guard selection in Tor. In: Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society, pp. 43\u201354. ACM (2012)","DOI":"10.1145\/2381966.2381973"},{"key":"20_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1007\/978-3-662-45472-5_21","volume-title":"Financial Cryptography and Data Security","author":"N Hopper","year":"2014","unstructured":"Hopper, N.: Challenges in protecting tor hidden services from botnet abuse. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 316\u2013325. Springer, Heidelberg (2014)"},{"key":"20_CR8","unstructured":"Houmansadr, A., Borisov, N.: Swirl: a scalable watermark to detect correlated network flows. In: Proceedings of the Network and Distributed Security Symposium - NDSS 2011. Internet Society, February 2011"},{"key":"20_CR9","unstructured":"Houmansadr, A., Kiyavash, N., Borisov, N.: Rainbow: a robust and invisible non-blind watermark for network flows. In: Proceedings of the Network and Distributed Security Symposium - NDSS 2009. Internet Society, February 2009"},{"key":"20_CR10","unstructured":"Anonymizer Inc. Anonymizer. https:\/\/www.anonymizer.com\/"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Jansen, R., Hopper, N.: Shadow: running Tor in a box for accurate and efficient experimentation. In: Proceedings of the Network and Distributed System Security Symposium - NDSS 2012, February 2012","DOI":"10.21236\/ADA559181"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Johnson, A., Wacek, C., Jansen, R., Sherr, M., Syverson, P.: Users get routed: traffic correlation on Tor by realistic adversaries. In: Proceedings of the 20th ACM Conference on Computer and Communications Security (2013)","DOI":"10.1145\/2508859.2516651"},{"key":"20_CR13","unstructured":"Kiyavash, N., Houmansadr, A., Borisov, N.: Multi-flow attacks against network flow watermarking schemes. In: USENIX Security Symposium (2008)"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Ling, Z., Luo, J., Yu, W., Fu, X., Xuan, D., Jia, W.: A new cell counter based attack against Tor. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 578\u2013589. ACM (2009)","DOI":"10.1145\/1653662.1653732"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Murdoch, S.J.: Hot or not: revealing hidden services by their clock skew. In: Proc. of the 13th ACM Conf. on Computer and Communications Security (2006)","DOI":"10.1145\/1180405.1180410"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"\u00d8verlier, L., Syverson, P.: Locating hidden servers. In: Proceedings of the 2006 IEEE Symposium on Security and Privacy, May 2006","DOI":"10.1109\/SP.2006.24"},{"issue":"2","key":"20_CR17","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/0167-4048(87)90087-3","volume":"6","author":"A Pfitzmann","year":"1987","unstructured":"Pfitzmann, A., Waidner, M.: Networks without user observability. Computers & Security 6(2), 158\u2013166 (1987)","journal-title":"Computers & Security"},{"key":"20_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/11863908_2","volume-title":"Computer Security \u2013 ESORICS 2006","author":"V Shmatikov","year":"2006","unstructured":"Shmatikov, V., Wang, M.-H.: Timing analysis in low-latency mix networks: attacks and defenses. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 18\u201333. Springer, Heidelberg (2006)"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Tang, C., Goldberg, I.: An improved algorithm for Tor circuit scheduling. In: Proc. of the 2010 ACM Conf. on Computer and Communications Security (2010)","DOI":"10.1145\/1866307.1866345"},{"key":"20_CR20","unstructured":"TorProject. Estimated Number of Clients in the Tor Network. https:\/\/metrics.torproject.org\/clients-data.html"},{"key":"20_CR21","unstructured":"TorProject. Unique .onion Address. https:\/\/metrics.torproject.org\/hidserv-dir-onions-seen.html"},{"key":"20_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-642-32946-3_9","volume-title":"Financial Cryptography and Data Security","author":"T Wang","year":"2012","unstructured":"Wang, T., Bauer, K., Forero, C., Goldberg, I.: Congestion-aware path selection for Tor. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 98\u2013113. Springer, Heidelberg (2012)"},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Wang, X., Chen, S., Jajodia, S.: Network flow watermarking attack on low-latency anonymous communication systems. In: IEEE Symposium on Security and Privacy, SP 2007, pp. 116\u2013130. IEEE (2007)","DOI":"10.1109\/SP.2007.30"},{"key":"20_CR24","doi-asserted-by":"crossref","unstructured":"Yang, L., Li, F.: mTor: a multipath Tor routing beyond bandwidth throttling. In: 2015 IEEE Conference on Communications and Network Security (CNS). IEEE (2015)","DOI":"10.1109\/CNS.2015.7346860"},{"key":"20_CR25","unstructured":"Zander, S., Murdoch, S.J.: An improved clock-skew measurement technique for revealing hidden services. In: USENIX Security Symposium (2008)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-28865-9_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,3]],"date-time":"2019-09-03T19:32:50Z","timestamp":1567539170000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-28865-9_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319288642","9783319288659"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-28865-9_20","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2015]]}}}