A Mapping Study on The Behavirol Analysis of Tor Relay Protocol


2017 International Conference on Computer Science and Engineering (UBMK), Antalya, Turkey, 5 - 08 October 2017, pp.288-293 identifier identifier

  • Publication Type: Conference Paper / Full Text
  • Doi Number: 10.1109/ubmk.2017.8093391
  • City: Antalya
  • Country: Turkey
  • Page Numbers: pp.288-293
  • Yıldız Technical University Affiliated: Yes


Tor, uses a protocol aimed at ensuring anonymity by distributing its communication over relays all over the world. This protocol designed to protect the privacy of Internet users from traffic analysis attacks launched by an adversary. The studies in the literature have shown that some attacks can be performed in the hidden service relays, or in exit nodes of services by eliminating anonimity. In this paper, a mapping study is conducted among the publications in the literature on Tor Service Protocol behavioral analysis and the results are reported.