Anonymity and Monitoring: How to Monitor the Infrastructure of an Anonymity System
The Tor network is a widely deployed anonymity system on the Internet used by thousands of users every day. A basic monitoring system has been designed and implemented to allow long-term statistics, provide feedback to the interested user, and detect certain attacks on the network. The implementatio...
Saved in:
Published in | IEEE transactions on systems, man and cybernetics. Part C, Applications and reviews Vol. 40; no. 5; pp. 539 - 546 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
New-York, NY
IEEE
01.09.2010
Institute of Electrical and Electronics Engineers |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | The Tor network is a widely deployed anonymity system on the Internet used by thousands of users every day. A basic monitoring system has been designed and implemented to allow long-term statistics, provide feedback to the interested user, and detect certain attacks on the network. The implementation has been added to TorStatus, a project to display the current state of the Tor network. During a period of six months, this monitoring system collected data, where information and patterns have been extracted and analyzed. Interestingly, the Tor network is very stable with more than half of all the servers located in Germany and the United States. The data also shows a sinusoidal pattern every 24 h in the total number of servers. |
---|---|
Bibliography: | ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 23 |
ISSN: | 1094-6977 1558-2442 |
DOI: | 10.1109/TSMCC.2010.2045372 |