{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T12:27:15Z","timestamp":1764937635702,"version":"3.37.3"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T00:00:00Z","timestamp":1699401600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T00:00:00Z","timestamp":1699401600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100010882","name":"Tianjin Municipal Education Commission","doi-asserted-by":"publisher","award":["2019KJ024"],"award-info":[{"award-number":["2019KJ024"]}],"id":[{"id":"10.13039\/501100010882","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In order to address the shortcomings of traditional anonymity network anonymity evaluation methods, which only analyze from the perspective of the overall network and ignore the attributes of individual nodes, we proposes a dynamic anonymity model based on a self-built anonymous system that combines node attributes, network behavior, and program security monitoring. The anonymity of evaluation nodes is assessed based on stable intervals and behavior baselines defined according to their normal operating status. The anonymity of the network is evaluated using an improved normalized information entropy method that refines anonymity evaluation to the anonymity of each node and expands the dimensionality of evaluation features. This paper compares the effectiveness of our proposed method with static framework information entropy and single indicator methods by evaluating the degree of anonymity provided by a self-built Tor anonymous network under multiple operating scenarios including normal and under attack. Our approach utilizes dynamically changing network anonymity based on multiple anonymous attributes and better reflects the degree of anonymity in anonymous systems.<\/jats:p>","DOI":"10.1186\/s42400-023-00191-8","type":"journal-article","created":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T02:01:48Z","timestamp":1699408908000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Tor network anonymity evaluation based on node anonymity"],"prefix":"10.1186","volume":"6","author":[{"given":"Jun","family":"Cui","sequence":"first","affiliation":[]},{"given":"Changqi","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Huan","family":"Meng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7320-5571","authenticated-orcid":false,"given":"Ran","family":"Wei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,8]]},"reference":[{"key":"#cr-split#-191_CR1.1","doi-asserted-by":"crossref","unstructured":"Backes M, Kate A, Meiser S, Mohammadi E (2014) (nothing else) mator","DOI":"10.1145\/2660267.2660371"},{"key":"#cr-split#-191_CR1.2","unstructured":"(s) monitoring the anonymity of Tor's path selection. In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, pp 513-524"},{"key":"191_CR2","doi-asserted-by":"publisher","first-page":"28769","DOI":"10.1109\/ACCESS.2021.3059672","volume":"9","author":"L Basyoni","year":"2021","unstructured":"Basyoni L, Erbad A, Alsabah M, Fetais N, Mohamed A, Guizani M (2021) QuicTor: Enhancing tor for real-time communication using QUIC transport protocol. IEEE Access 9:28769\u201328784","journal-title":"IEEE Access"},{"key":"191_CR3","doi-asserted-by":"crossref","unstructured":"Berthold O, Federrath H, K\u00f6psell S (2001) Web mixes: a system for anonymous and unobservable internet access. In: Designing privacy enhancing technologies: international workshop on design issues in anonymity and unobservability Berkeley, Springer, pp. 115\u2013129","DOI":"10.1007\/3-540-44702-4_7"},{"issue":"1","key":"191_CR4","doi-asserted-by":"publisher","first-page":"137","DOI":"10.3390\/app12010137","volume":"12","author":"F Buccafurri","year":"2021","unstructured":"Buccafurri F, De Angelis V, Idone MF, Labrini C, Lazzaro S (2021) Achieving sender anonymity in tor against the global passive adversary. Appl Sci 12(1):137","journal-title":"Appl Sci"},{"issue":"2","key":"191_CR5","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"DL Chaum","year":"1981","unstructured":"Chaum DL (1981) Untraceable electronic mail, return addresses, and digital pseudonyms. Commun ACM 24(2):84\u201390","journal-title":"Commun ACM"},{"issue":"4","key":"191_CR6","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1515\/popets-2017-0046","volume":"2017","author":"G Cherubin","year":"2017","unstructured":"Cherubin G (2017) Bayes, not na\u00efve: security bounds on website fingerprinting defenses. Proc Priv Enhancing Technol 2017(4):215\u2013231","journal-title":"Proc Priv Enhancing Technol"},{"key":"191_CR7","doi-asserted-by":"crossref","unstructured":"Clau\u00df S, Schiffner S (2006) Structuring anonymity metrics. In: Proceedings of the second ACM workshop on digital identity management, pp 55\u201362","DOI":"10.1145\/1179529.1179539"},{"issue":"2","key":"191_CR8","doi-asserted-by":"publisher","first-page":"194","DOI":"10.2478\/popets-2021-0024","volume":"2021","author":"R Dahlberg","year":"2021","unstructured":"Dahlberg R, Pulls T, Ritter T, Syverson P (2021) Privacy-preserving & incrementally-deployable support for certificate transparency in Tor. Proc Priv Enhancing Technol 2021(2):194\u2013213","journal-title":"Proc Priv Enhancing Technol"},{"key":"191_CR9","doi-asserted-by":"crossref","unstructured":"Diaz C, Troncoso C, Danezis G (2007) Does additional information always reduce anonymity? In: Proceedings of the 2007 ACM workshop on privacy in electronic society, pp 72\u201375","DOI":"10.1145\/1314333.1314347"},{"key":"191_CR10","doi-asserted-by":"crossref","unstructured":"Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. Technical report, Naval Research Lab Washington DC","DOI":"10.21236\/ADA465464"},{"key":"191_CR11","doi-asserted-by":"crossref","unstructured":"Eaton E, Sasy S, Goldberg I (2022) Improving the privacy of Tor onion services. In: International conference on applied cryptography and network security, Springer, pp 273\u2013292","DOI":"10.1007\/978-3-031-09234-3_14"},{"issue":"8","key":"191_CR12","doi-asserted-by":"publisher","first-page":"2034","DOI":"10.1109\/TKDE.2015.2405563","volume":"27","author":"O Gkountouna","year":"2015","unstructured":"Gkountouna O, Terrovitis M (2015) Anonymizing collections of tree-structured data. IEEE Trans Knowl Data Eng 27(8):2034\u20132048","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"191_CR13","unstructured":"Guan Y, Fu X, Bettati R, Zhao W (2002) An optimal strategy for anonymous communication protocols. In: Proceedings 22nd international conference on distributed computing systems, IEEE, pp 257\u2013266"},{"key":"191_CR14","doi-asserted-by":"crossref","unstructured":"Jansen R, Tschorsch F, Johnson A, Scheuermann B (2014) The sniper attack: anonymously deanonymizing and disabling the tor network. Technical report, Office of Naval Research Arlington, VA","DOI":"10.14722\/ndss.2014.23288"},{"key":"191_CR15","unstructured":"Jansen R, Vaidya T, Sherr M (2019) Point break: a study of bandwidth denial-of-service attacks against tor. In: USENIX security symposium, pp 1823\u20131840"},{"key":"191_CR16","doi-asserted-by":"publisher","first-page":"105","DOI":"10.2478\/popets-2019-0022","volume":"2","author":"C Kuhn","year":"2019","unstructured":"Kuhn C, Beck M, Schiffner S, Jorswieck E, Strufe T (2019) On privacy notions in anonymous communication. Proc Priv Enhancing Technol 2:105\u2013125","journal-title":"Proc Priv Enhancing Technol"},{"key":"191_CR17","unstructured":"Kwon A, AlSabah M, Lazar D, Dacier M, Devadas S (2015) Circuit fingerprinting attacks: passive deanonymization of tor hidden services. In: 24th $$\\{$$USENIX$$\\}$$ security symposium ($$\\{$$USENIX$$\\}$$ Security 15), pp 287\u2013302"},{"key":"191_CR18","doi-asserted-by":"crossref","unstructured":"Melloni A, Stam M, Ytrehus \u00d8 (2022) On evaluating anonymity of onion routing. In: Selected areas in cryptography: 28th international conference, virtual event, Springer, pp 3\u201324","DOI":"10.1007\/978-3-030-99277-4_1"},{"key":"191_CR19","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.jss.2015.01.002","volume":"103","author":"SM Milajerdi","year":"2015","unstructured":"Milajerdi SM, Kharrazi M (2015) A composite-metric based path selection technique for the tor anonymity network. J Syst Softw 103:53\u201361","journal-title":"J Syst Softw"},{"key":"191_CR20","doi-asserted-by":"crossref","unstructured":"Mittal P, Khurshid A, Juen J, Caesar M, Borisov N (2011) Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting. In: Proceedings of the 18th ACM conference on computer and communications security, pp 215\u2013226","DOI":"10.1145\/2046707.2046732"},{"key":"191_CR21","doi-asserted-by":"crossref","unstructured":"Pfitzmann A, K\u00f6hntopp M (2001) Anonymity, unobservability, and pseudonymity-a proposal for terminology. In: Designing privacy enhancing technologies: international workshop on design issues in anonymity and unobservability Berkeley, Springer, pp 1\u20139","DOI":"10.1007\/3-540-44702-4_1"},{"key":"191_CR22","unstructured":"Piotrowska AM, Hayes J, Elahi T, Meiser S, Danezis G (2017) The loopix anonymity system. In: 26th $$\\{$$USENIX$$\\}$$ security symposium ($$\\{$$USENIX$$\\}$$ security 17), pp 1199\u20131216"},{"key":"191_CR23","doi-asserted-by":"crossref","unstructured":"Reininger M, Arora A, Herwig S, Francino N, Hurst J, Garman C, Levin D (2021) Bento: safely bringing network function virtualization to Tor. In: Proceedings of the 2021 ACM SIGCOMM 2021 conference, pp 821\u2013835","DOI":"10.1145\/3452296.3472919"},{"issue":"1","key":"191_CR24","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/290163.290168","volume":"1","author":"MK Reiter","year":"1998","unstructured":"Reiter MK, Rubin AD (1998) Crowds: anonymity for web transactions. ACM Trans Inf Syst Security (TISSEC) 1(1):66\u201392","journal-title":"ACM Trans Inf Syst Security (TISSEC)"},{"issue":"2","key":"191_CR25","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1515\/popets-2017-0013","volume":"207","author":"F Rochet","year":"2017","unstructured":"Rochet F, Pereira O (2017) Waterfilling: balancing the tor network with maximum diversity. Proc Privacy Enhancing Technol 207(2):4\u201322","journal-title":"Proc Privacy Enhancing Technol"},{"issue":"12","key":"191_CR26","doi-asserted-by":"publisher","first-page":"3473","DOI":"10.1109\/TMC.2017.2690634","volume":"16","author":"K Sakai","year":"2017","unstructured":"Sakai K, Sun M-T, Ku W-S, Wu J, Alanazi FS (2017) Performance and security analyses of onion-based anonymous routing for delay tolerant networks. IEEE Trans Mob Comput 16(12):3473\u20133487","journal-title":"IEEE Trans Mob Comput"},{"key":"191_CR27","doi-asserted-by":"crossref","unstructured":"Schnitzler T, P\u00f6pper C, D\u00fcrmuth M, Kohls K (2021) We built this circuit: exploring threat vectors in circuit establishment in Tor. In: 2021 IEEE European symposium on security and privacy (EuroS &P), IEEE, pp 319\u2013336","DOI":"10.1109\/EuroSP51992.2021.00030"},{"key":"191_CR28","doi-asserted-by":"crossref","unstructured":"Serjantov A, Danezis G (2003) Towards an information theoretic metric for anonymity. In: Privacy enhancing technologies: second international workshop, PET 2002 San Francisco, Springer, pp 41\u201353","DOI":"10.1007\/3-540-36467-6_4"},{"key":"191_CR29","unstructured":"Snader R, Borisov N (2008) A tune-up for Tor: improving security and performance in the tor network. In: NDSS, vol 8, p 127"},{"key":"191_CR30","unstructured":"Sun Y, Edmundson A, Vanbever L, Li O, Rexford J, Chiang M, Mittal P (2015) $$\\{$$RAPTOR$$\\}$$: routing attacks on privacy in tor. In: 24th $$\\{$$USENIX$$\\}$$ security symposium ($$\\{$$USENIX$$\\}$$ security 15), pp 271\u2013286"},{"issue":"10","key":"191_CR31","first-page":"2373","volume":"52","author":"Q Tan","year":"2015","unstructured":"Tan Q, Shi J, Fang B, Guo L, Zhang W, Wang X, Wei B (2015) Towards measuring unobservability in anonymous communication systems. J Comput Res Dev 52(10):2373\u20132381","journal-title":"J Comput Res Dev"},{"issue":"6","key":"191_CR32","doi-asserted-by":"publisher","first-page":"2574","DOI":"10.1109\/TNET.2022.3174003","volume":"30","author":"Q Tan","year":"2022","unstructured":"Tan Q, Wang X, Shi W, Tang J, Tian Z (2022) An anonymity vulnerability in Tor. IEEE\/ACM Trans Netw 30(6):2574\u20132587","journal-title":"IEEE\/ACM Trans Netw"},{"key":"191_CR33","unstructured":"T\u00f3th G, Horn\u00e1k Z, Vajda F (2004) Measuring anonymity revisited. In: Proceedings of the ninth Nordic workshop on secure IT systems, pp 85\u201390"},{"key":"191_CR34","doi-asserted-by":"crossref","unstructured":"Wails R, Sun Y, Johnson A, Chiang M, Mittal P (2018) Tempest: temporal dynamics in anonymity systems. Preprint arXiv:1801.01932","DOI":"10.1515\/popets-2018-0019"},{"key":"191_CR35","doi-asserted-by":"crossref","unstructured":"Winter P, K\u00f6wer R, Mulazzani M, Huber M, Schrittwieser S, Lindskog S, Weippl E (2014) Spoiled onions: exposing malicious tor exit relays. In: Privacy enhancing technologies: 14th international symposium, PETS 2014, Amsterdam, Springer, pp 304\u2013331","DOI":"10.1007\/978-3-319-08506-7_16"},{"key":"191_CR36","doi-asserted-by":"publisher","first-page":"102106","DOI":"10.1016\/j.cose.2020.102106","volume":"101","author":"Y Xia","year":"2021","unstructured":"Xia Y, Chen R, Su J, Zou H (2021) Balancing anonymity and resilience in anonymous communication networks. Comput Secur 101:102106","journal-title":"Comput Secur"},{"key":"191_CR37","doi-asserted-by":"crossref","unstructured":"Yang K, Xiao M, et al (2022) A Framework for formal analysis of anonymous communication protocols. Security and Communication Networks 2022","DOI":"10.1155\/2022\/4659951"},{"key":"191_CR38","doi-asserted-by":"crossref","unstructured":"Zhang W, Lu T, Du Z (2021) TNRAS: Tor nodes reliability analysis scheme. In: 2021 the 11th international conference on communication and network security, pp 21\u201326","DOI":"10.1145\/3507509.3507512"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-023-00191-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-023-00191-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-023-00191-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T20:17:45Z","timestamp":1700511465000},"score":1,"resource":{"primary":{"URL":"https:\/\/cybersecurity.springeropen.com\/articles\/10.1186\/s42400-023-00191-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,8]]},"references-count":39,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["191"],"URL":"https:\/\/doi.org\/10.1186\/s42400-023-00191-8","relation":{},"ISSN":["2523-3246"],"issn-type":[{"type":"electronic","value":"2523-3246"}],"subject":[],"published":{"date-parts":[[2023,11,8]]},"assertion":[{"value":"12 May 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 November 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"55"}}