{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T06:29:55Z","timestamp":1775716195250,"version":"3.50.1"},"reference-count":86,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2021,9,8]],"date-time":"2021-09-08T00:00:00Z","timestamp":1631059200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["830929"],"award-info":[{"award-number":["830929"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100014440","name":"Ministerio de Ciencia, Innovaci\u00f3n y Universidades","doi-asserted-by":"publisher","award":["RTI2018-095855-B-I00"],"award-info":[{"award-number":["RTI2018-095855-B-I00"]}],"id":[{"id":"10.13039\/100014440","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100014440","name":"Ministerio de Ciencia, Innovaci\u00f3n y Universidades","doi-asserted-by":"publisher","award":["TIN2017-86885-R"],"award-info":[{"award-number":["TIN2017-86885-R"]}],"id":[{"id":"10.13039\/100014440","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCP"],"abstract":"<jats:p>Anonymous communications networks were created to protect the privacy of communications, preventing censorship and traffic analysis. The most famous anonymous communication network is Tor. This anonymous communication network provides some interesting features. Among them, we can mention that Tor can hide a user\u2019s IP address when accessing to a service such as the Web, and it also supports Tor hidden services (THS) (now named onion services) as a mechanism to conceal the server\u2019s IP address, used mainly to provide anonymity to websites. THS is an important research field in Tor. However, there is a lack of reviews that sum up the main findings and research challenges. In this article, we present a systematic literature review that aims to offer a comprehensive overview of the research made on THS by presenting the state-of-the-art and the different research challenges to be addressed. This review has been developed from a selection of 57 articles and presents main findings and advances regarding Tor hidden services, limitations found, and future issues to be investigated.<\/jats:p>","DOI":"10.3390\/jcp1030025","type":"journal-article","created":{"date-parts":[[2021,9,8]],"date-time":"2021-09-08T10:12:03Z","timestamp":1631095923000},"page":"496-518","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Tor Hidden Services: A Systematic Literature Review"],"prefix":"10.3390","volume":"1","author":[{"given":"Diana L.","family":"Huete Trujillo","sequence":"first","affiliation":[{"name":"Department of Information and Communications Engineering, University of Murcia, 30100 Murcia, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8433-159X","authenticated-orcid":false,"given":"Antonio","family":"Ruiz-Mart\u00ednez","sequence":"additional","affiliation":[{"name":"Department of Information and Communications Engineering, University of Murcia, 30100 Murcia, Spain"}]}],"member":"1968","published-online":{"date-parts":[[2021,9,8]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., and Syverson, P. (2004). Tor: The Second-Generation Onion Router, Naval Research Lab. Technical report.","DOI":"10.21236\/ADA465464"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1016\/j.compeleceng.2017.11.027","article-title":"Systematic literature review on the state of the art and future research work in anonymous communications systems","volume":"69","year":"2018","journal-title":"Comput. Electr. Eng."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Basyoni, L., Fetais, N., Erbad, A., Mohamed, A., and Guizani, M. (2020, January 2\u20135). Traffic Analysis Attacks on Tor: A Survey. Proceedings of the 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), Doha, Qatar.","DOI":"10.1109\/ICIoT48696.2020.9089497"},{"key":"ref_4","unstructured":"(2021, July 23). Tor Project\u2014History. Available online: https:\/\/www.torproject.org\/es\/about\/history\/."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2018.04.002","article-title":"Shedding Light on the Dark Corners of the Internet: A Survey of Tor Research","volume":"114","author":"Saleh","year":"2018","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_6","unstructured":"Cambiaso, E., Vaccari, I., Patti, L., and Aiello, M. (2019, January 13\u201315). Darknet Security: A Categorization of Attacks to the Tor Network. Proceedings of the ITASEC, Pisa, Italy."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"De la Cadena, W., Mitseva, A., Hiller, J., Pennekamp, J., Reuter, S., Filter, J., Engel, T., Wehrle, K., and Panchenko, A. (2020, January 9\u201313). TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting. Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA.","DOI":"10.1145\/3372297.3423351"},{"key":"ref_8","unstructured":"Pulls, T. (2020). Towards Effective and Efficient Padding Machines for Tor. arXiv."},{"key":"ref_9","unstructured":"Tor Project (2021, July 23). Tor Metrics\u2014Onion Services. Available online: https:\/\/metrics.torproject.org\/hidserv-dir-onions-seen.html."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"He, S., He, Y., and Li, M. (2019, January 4\u20138). Classification of Illegal Activities on the Dark Web. Proceedings of the ACM International Conference Proceeding Series, Tempe, AZ, USA.","DOI":"10.1145\/3322645.3322691"},{"key":"ref_11","unstructured":"Perry, M. (2021, July 23). This Is What a Tor Supporter Looks Like: Edward Snowden|Tor Blog. Available online: https:\/\/blog.torproject.org\/what-tor-supporter-looks-edward-snowden."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"21746","DOI":"10.1109\/ACCESS.2021.3055532","article-title":"Exploring the Topological Properties of the Tor Dark Web","volume":"9","author":"Alharbi","year":"2021","journal-title":"IEEE Access"},{"key":"ref_13","unstructured":"Ball, M., and Broadhurst, R. (2021). Data Capture and Analysis of Darknet Markets, Social Science Research Network. Number ID 3344936."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1016\/j.drugpo.2016.05.006","article-title":"Ethics in cryptomarket research","volume":"35","author":"Martin","year":"2016","journal-title":"Int. J. Drug Policy"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Platzer, F., Sch\u00e4fer, M., and Steinebach, M. (2021). Critical Traffic Analysis on the Tor Network. J. Cyber Secur. Mobil., 133\u2013160.","DOI":"10.13052\/jcsm2245-1439.1015"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Jardine, E. (2015). The Dark Web Dilemma: Tor, Anonymity and Online Policing, Social Science Research Network. Number ID 2667711.","DOI":"10.2139\/ssrn.2667711"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"111","DOI":"10.2478\/popets-2020-0020","article-title":"Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and JonDonym","volume":"2020","author":"David","year":"2020","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"ref_18","unstructured":"Kitchenham, B., and Charters, S. (2007). Guidelines for Performing Systematic Literature Reviews in Software Engineering, Software Engineering Group, School of Computer Science and Mathematics, Keele University and Department of Computer Science, University of Durham. Number EBSE-2007-01."},{"key":"ref_19","unstructured":"Ruiz-Mart\u00ednez, A. (2021, August 25). ARM\u2019s Privacy Resources. Available online: https:\/\/webs.um.es\/arm\/privacy.html."},{"key":"ref_20","unstructured":"Tor Project (2021, July 23). Tor Design Documents. Available online: https:\/\/2019.www.torproject.org\/docs\/documentation.html.en#DesignDoc."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1473","DOI":"10.1016\/j.jnca.2012.02.011","article-title":"A survey on solutions and main free tools for privacy enhancing Web communications","volume":"35","year":"2012","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Thampi, S.M., Martinez Perez, G., Ko, R., and Rawat, D.B. (2020). Towards a Privacy Web Scanner for End-Users. Security in Computing and Communications, Springer. Communications in Computer and Information Science.","DOI":"10.1007\/978-981-15-4825-3"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"420","DOI":"10.1016\/j.comcom.2009.11.009","article-title":"Survey on anonymous communications in computer networks","volume":"33","author":"Ren","year":"2010","journal-title":"Comput. Commun."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2946802","article-title":"Performance and Security Improvements for Tor","volume":"49","author":"Alsabah","year":"2016","journal-title":"ACM Comput. Surv."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Pustogarov, I., and Weinmann, R.P. (2013, January 19\u201322). Trawling for tor hidden services: Detection, measurement, deanonymization. Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, CA, USA.","DOI":"10.1109\/SP.2013.15"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Nepal, S., Dahal, S., and Shin, S. (2015, January 12\u201314). Deanonymizing schemes of hidden services in tor network: A survey. Proceedings of the IEEE 2015 International Conference on Information Networking (ICOIN), Siem Reap, Cambodia.","DOI":"10.1109\/ICOIN.2015.7057949"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/j.infsof.2008.09.009","article-title":"Systematic literature reviews in software engineering\u2014A systematic literature review","volume":"51","author":"Kitchenham","year":"2009","journal-title":"Inf. Softw. Technol."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Okoli, C. (2015). A Guide to Conducting a Standalone Systematic Literature Review. Commun. Assoc. Inf. Syst., 37.","DOI":"10.17705\/1CAIS.03743"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1177\/0739456X17723971","article-title":"Guidance on conducting a systematic literature review","volume":"39","author":"Xiao","year":"2019","journal-title":"J. Plan. Educ. Res."},{"key":"ref_30","unstructured":"Kitchenham, B. (2004). Procedures for Performing Systematic Reviews, Keele University. Technical report."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"2805","DOI":"10.1016\/j.chb.2013.07.031","article-title":"A review of the available content on Tor hidden services: The case against further development","volume":"29","author":"Guitton","year":"2013","journal-title":"Comput. Hum. Behav."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Pustogarov, I., Thill, F., and Weinmann, R.P. (July, January 30). Content and Popularity Analysis of Tor Hidden Services. Proceedings of the 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops, Washington, DC, USA.","DOI":"10.1109\/ICDCSW.2014.20"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Spitters, M., Verbruggen, S., and van Staalduinen, M. (2014, January 24\u201326). Towards a Comprehensive Insight into the Thematic Organization of the Tor Hidden Services. Proceedings of the 2014 IEEE Joint Intelligence and Security Informatics Conference, Washington, DC, USA.","DOI":"10.1109\/JISIC.2014.40"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1049\/iet-ifs.2015.0121","article-title":"Empirical analysis of Tor Hidden Services","volume":"10","author":"Savage","year":"2016","journal-title":"IET Inf. Secur."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Li, K., Liu, P., Tan, Q., Shi, J., Gao, Y., and Wang, X. (2016, January 4\u20138). Out-of-band discovery and evaluation for Tor hidden services. Proceedings of the 31st Annual ACM Symposium on Applied Computing\u2014SAC\u201916, Pisa, Italy.","DOI":"10.1145\/2851613.2851798"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3008662","article-title":"Exploring and Analyzing the Tor Hidden Services Graph","volume":"11","author":"Bernaschi","year":"2017","journal-title":"ACM Trans. Web"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Biswas, R., Fidalgo, E., and Alegre, E. (2017, January 13\u201315). Recognition of service domains on TOR dark net using perceptual hashing and image classification techniques. Proceedings of the 8th International Conference on Imaging for Crime Detection and Prevention (ICDP 2017). Institution of Engineering and Technology, Madrid, Spain.","DOI":"10.1049\/ic.2017.0041"},{"key":"ref_38","unstructured":"Nabki, M.W.A., Fidalgo, E., Alegre, E., and De Paz, I. (2017, January 3\u20137). Classifying illegal activities on tor network based on web textual contents. Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics EACL 2017, Valencia, Spain."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Ghosh, S., Das, A., Porras, P., Yegneswaran, V., and Gehani, A. (2017, January 13\u201317). Automated Categorization of Onion Sites for Analyzing the Darkweb Ecosystem. Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining\u2014KDD\u201917, Halifax, NS, USA.","DOI":"10.1145\/3097983.3098193"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Sanchez-Rola, I., Balzarotti, D., and Santos, I. (2017, January 3\u20137). The Onions Have Eyes: A Comprehensive Structure and Privacy Analysis of Tor Hidden Services. Proceedings of the 26th International Conference on World Wide Web\u2014WWW\u201917, Perth, Australia.","DOI":"10.1145\/3038912.3052657"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.diin.2019.05.004","article-title":"Classifying Suspicious Content in Tor Darknet through Semantic Attention Keypoint Filtering $","volume":"30","author":"Fidalgo","year":"2019","journal-title":"Digit. Investig."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Faizan, M., and Khan, R.A. (2019). Exploring and analyzing the dark Web: A new alchemy. First Monday, 24.","DOI":"10.5210\/fm.v24i5.9473"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Takaaki, S., and Atsuo, I. (2019, January 25\u201327). Dark web content analysis and visualization. Proceedings of the IWSPA 2019\u2014ACM International Workshop on Security and Privacy Analytics, Co-Located with CODASPY 2019, Dallas, TX, USA.","DOI":"10.1145\/3309182.3309189"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1016\/j.eswa.2019.01.029","article-title":"ToRank: Identifying the most influential suspicious domains in the Tor network","volume":"123","author":"Fidalgo","year":"2019","journal-title":"Expert Syst. Appl."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Bernaschi, M., Celestini, A., Guarino, S., Lombardi, F., and Mastrostefano, E. (2019, January 28\u201330). Spiders like Onions: On the Network of Tor Hidden Services. Proceedings of the World Wide Web Conference on\u2014WWW\u201919, San Francisco, CA, USA.","DOI":"10.1145\/3308558.3313687"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Park, J., Mun, H., and Lee, Y. (2019, January 10\u201313). Improving Tor Hidden Service Crawler Performance. Proceedings of the DSC 2018-2018 IEEE Conference on Dependable and Secure Computing, Kaohsiung, Taiwan.","DOI":"10.1109\/DESEC.2018.8625103"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Overlier, L., and Syverson, P. (2006, January 21\u201323). Locating hidden servers. Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P\u201906), Washington, DC, USA.","DOI":"10.1109\/SP.2006.24"},{"key":"ref_48","unstructured":"Murdoch, S.J. (November, January 30). Hot or Not : Revealing Hidden Services by their Clock Skew Categories and Subject Descriptors. Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, VA, USA."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"\u00d8verlier, L., and Syverson, P. (2006, January 19\u201321). Valet Services: Improving Hidden Servers with a Personal Touch. Proceedings of the International Symposium on Privacy Enhancing Technologies Symposium, Berlin, Germany.","DOI":"10.1007\/11957454_13"},{"key":"ref_50","unstructured":"Zander, S., and Murdoch, S. (August, January 28). An Improved Clock-skew Measurement Technique for Revealing Hidden Services. Proceedings of the 17th USENIX Security Symposium."},{"key":"ref_51","first-page":"S104","article-title":"Leaving timing-channel fingerprints in hidden service log files","volume":"Volume 7","author":"Shebaro","year":"2010","journal-title":"Proceedings of the DFRWS 2010 Annual Conference"},{"key":"ref_52","unstructured":"Zhang, L., Luo, J., Yang, M., and He, G. (2011, January 11\u201313). Application-level attack against Tor\u2019s hidden service. Proceedings of the IEEE 2011 6th International Conference on Pervasive Computing and Applications, Oulu, Finland."},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Elices, J.A., Perez-Gonzalez, F., and Troncoso, C. (December, January 29). Fingerprinting Tor\u2019s hidden service log files using a timing channel. Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, Iguacu Falls, Brazil.","DOI":"10.1109\/WIFS.2011.6123154"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"829","DOI":"10.1016\/j.comcom.2012.01.008","article-title":"Ferris wheel: A ring based onion circuit for hidden services","volume":"35","author":"Beitollahi","year":"2012","journal-title":"Comput. Commun."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Elices, J.A., and Perez-Gonzalez, F. (2012, January 2\u20135). Fingerprinting a flow of messages to an anonymous server. Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security (WIFS), Tenerife, Spain.","DOI":"10.1109\/WIFS.2012.6412632"},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Elices, J.A., and Perez-Gonzalez, F. (2013, January 14\u201316). Locating Tor hidden services through an interval-based traffic-correlation attack. Proceedings of the 2013 IEEE Conference on Communications and Network Security (CNS), Washington, DC, USA.","DOI":"10.1109\/CNS.2013.6682740"},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Ling, Z., Luo, J., Wu, K., and Fu, X. (2013, January 14\u201319). Protocol-level hidden server discovery. Proceedings of the 2013 Proceedings IEEE INFOCOM, Turin, Italy.","DOI":"10.1109\/INFCOM.2013.6566894"},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Hopper, N. (2014, January 3\u20137). Challenges in Protecting Tor Hidden Services from Botnet Abuse. Proceedings of the International Conference on Financial Cryptography and Data Security, Christ Church, Barbados.","DOI":"10.1007\/978-3-662-45472-5_21"},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Matic, S., Kotzias, P., and Caballero, J. (2015, January 12\u201316). CARONTE: Detecting Location Leaks for Deanonymizing Tor Hidden Services. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security\u2014CCS\u201915, Denver, CO, USA.","DOI":"10.1145\/2810103.2813667"},{"key":"ref_60","unstructured":"Kwon, A., AlSabah, M., Lazar, D., Dacier, M., and Devadas, S. (2015, January 12\u201314). Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services. Proceedings of the 24th USENIX Security Symposium, Washington, DC, USA."},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Yang, L., and Li, F. (2015, January 28\u201330). Enhancing traffic analysis resistance for Tor hidden services with multipath routing. Proceedings of the 2015 IEEE Conference on Communications and NetworkSecurity, CNS 2015, Florence, Italy.","DOI":"10.1109\/CNS.2015.7346915"},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Sanatinia, A., and Noubir, G. (2016, January 17\u201319). Honey Onions: A framework for characterizing and identifying misbehaving Tor HSDirs. Proceedings of the 2016 IEEE Conference on Communications and Network Security (CNS), Philadelphia, PA, USA.","DOI":"10.1109\/CNS.2016.7860478"},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Nurmi, J., Kannisto, J., and Vajaranta, M. (2016, January 4\u20135). Observing Hidden Service Directory Spying with a Private Hidden Service Honeynet. Proceedings of the IEEE 2016 11th Asia Joint Conference on Information Security (AsiaJCIS), Fukuoka, Japan.","DOI":"10.1109\/AsiaJCIS.2016.31"},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"2817","DOI":"10.1587\/transinf.2016EDL8100","article-title":"Transparent Discovery of Hidden Service","volume":"99","author":"Wang","year":"2016","journal-title":"IEICE Trans. Inf. Syst."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"839","DOI":"10.1587\/transinf.2015ICP0001","article-title":"A Novel Protocol-Feature Attack against Tor\u2019s Hidden Service","volume":"99","author":"Wang","year":"2016","journal-title":"IEICE Trans. Inf. Syst."},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Ma, Y., and Xu, X. (2017, January 15\u201317). Locating tor\u2019s hidden service clients based on protocol feature. Proceedings of the 2017 IEEE 2nd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), Chengdu, China.","DOI":"10.1109\/ITNEC.2017.8284989"},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Overdorf, R., Juarez, M., Acar, G., Greenstadt, R., and Diaz, C. (November, January 30). How Unique is Your .onion? An Analysis of the Fingerprintability of Tor Onion Services. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security\u2014CCS\u201917, Dallas, TX, USA.","DOI":"10.1145\/3133956.3134005"},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Panchenko, A., Mitseva, A., Henze, M., Lanze, F., Wehrle, K., and Engel, T. (November, January 30). Analysis of Fingerprinting Techniques for Tor Hidden Services. Proceedings of the 2017 on Workshop on Privacy in the Electronic Society\u2014WPES\u201917, Dallas, TX, USA.","DOI":"10.1145\/3139550.3139564"},{"key":"ref_69","unstructured":"Sanatinia, A., and Noubir, G. (2017, January 29). Off-path man-in-the-middle attack on tor hidden services. Proceedings of the New England Security Day (NESD), Boston, MA, USA."},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Tan, Q., Gao, Y., Shi, J., Wang, X., and Fang, B. (2017, January 21\u201325). A closer look at Eclipse attacks against Tor hidden services. Proceedings of the 2017 IEEE International Conference on Communications (ICC), Paris, France.","DOI":"10.1109\/ICC.2017.7996832"},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Iacovazzi, A., Sarda, S., and Elovici, Y. (2018, January 15\u201319). Inflow: Inverse Network Flow Watermarking for Detecting Hidden Servers. Proceedings of the IEEE INFOCOM 2018\u2014IEEE Conference on Computer Communications, Honolulu, HI, USA.","DOI":"10.1109\/INFOCOM.2018.8486375"},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"1584","DOI":"10.1109\/JIOT.2018.2846624","article-title":"Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services","volume":"6","author":"Tan","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Loesing, K., Sandmann, W., Wilms, C., and Wirtz, G. (August, January 28). Performance Measurements and Statistics of Tor Hidden Services. Proceedings of the 2008 IEEE International Symposium on Applications and the Internet, Washington, DC, USA.","DOI":"10.1109\/SAINT.2008.69"},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Lenhard, J., Loesing, K., and Wirtz, G. (2009, January 2\u20135). Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks. Proceedings of the International Conference on Applied Cryptography and Network Security, Paris, France.","DOI":"10.1007\/978-3-642-01957-9_20"},{"key":"ref_75","doi-asserted-by":"crossref","unstructured":"Meng, Y., Zhao, X., Fei, J., and Zhu, Y. (2017, January 24\u201325). A hidden service model based on HS-HS anonymous network. Proceedings of the AIP Conference Proceedings, Jakarta, Indonesia.","DOI":"10.1063\/1.5005184"},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Liu, P., Wang, X., He, X., Li, C., Cao, S., He, L., and Zhu, J. (2017, January 17\u201318). A quantitative model for analysis and evaluation of tor hidden service discovery. Proceedings of the Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Jeddah, Saudi Arabia.","DOI":"10.1007\/978-3-319-73317-3_10"},{"key":"ref_77","doi-asserted-by":"crossref","unstructured":"\u00d8verlier, L., and Syverson, P. (2007). Improving Efficiency and Simplicity of Tor Circuit Establishment and Hidden Services. Privacy Enhancing Technologies, Springer.","DOI":"10.1007\/978-3-540-75551-7_9"},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1515\/popets-2017-0003","article-title":"The Onion Name System","volume":"2017","author":"Victors","year":"2016","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"ref_79","doi-asserted-by":"crossref","unstructured":"Meng, Y., Fei, J., Chen, Y., and Zhu, Y. (2018). A Domain Name Model of Anonymous Network Hidden Service. Proceedings of the International Conference on Cloud Computing and Security, Haikou, China, 8\u201310 June 2018, Springer.","DOI":"10.1007\/978-3-030-00015-8_10"},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Liang, J., and Liu, Y. (2018, January 12\u201314). An Improved Method to Build a Circuit of Tor Hidden Service. Proceedings of the International Conference on Automation, Mechanical Control and Computational Engineering, Tokyo, Japan.","DOI":"10.2991\/amcce-18.2018.21"},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Betzwieser, J.D., Mason, W.R., Redmann, R.F., Taylor, Z.S., Tsao, S.H., Brown, D.E., and Conklin, J.H. (July, January 29). Systems methodology to characterizing the threat posed by anonymous systems on the internet. Proceedings of the IEEE 2009 Systems and Information Engineering Design Symposium, Seoul, Korea.","DOI":"10.1109\/SIEDS.2009.5166173"},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.diin.2018.09.005","article-title":"The darknet\u2019s smaller than we thought: The life cycle of Tor Hidden Services","volume":"27","author":"Owenson","year":"2018","journal-title":"Digit. Investig."},{"key":"ref_83","doi-asserted-by":"crossref","unstructured":"Anagnostopoulos, M., Kambourakis, G., Drakatos, P., Karavolos, M., Kotsilitis, S., and Yau, D.K.Y. (2017, January 7\u201311). Botnet Command and Control Architectures Revisited: Tor Hidden Services and Fluxing. Proceedings of the Web Information Systems Engineering\u2014WISE 2017, Puschino, Russia.","DOI":"10.1007\/978-3-319-68786-5_41"},{"key":"ref_84","unstructured":"Winter, P., Edmundson, A., Roberts, L.M., Dutkowska, A., Chetty, M., and Feamster, N. (2018, January 12\u201314). How Do Tor Users Interact With Onion Services?. Proceedings of the USENIX Security Symposium, Baltimore, MD, USA."},{"key":"ref_85","unstructured":"Tor Project (2021, July 23). Tor Rendezvous Specification\u2014Version 3. Available online: https:\/\/gitweb.torproject.org\/torspec.git\/tree\/rend-spec-v3.txt."},{"key":"ref_86","unstructured":"Tor Project (2021, July 23). Tor Metrics. Available online: https:\/\/metrics.torproject.org\/."}],"container-title":["Journal of Cybersecurity and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2624-800X\/1\/3\/25\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T06:58:39Z","timestamp":1760165919000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2624-800X\/1\/3\/25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,8]]},"references-count":86,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2021,9]]}},"alternative-id":["jcp1030025"],"URL":"https:\/\/doi.org\/10.3390\/jcp1030025","relation":{"has-preprint":[{"id-type":"doi","id":"10.20944\/preprints202107.0600.v1","asserted-by":"object"}]},"ISSN":["2624-800X"],"issn-type":[{"value":"2624-800X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,8]]}}}