Abstract
Tor is one of the most popular anonymous communication systems, and its ability of providing receiver anonymity makes hidden services more and more attractive. However, with the exposure of illegal contents such as child pornography and drug trades in hidden services, it becomes urgent to make a comprehensive analysis and evaluation of hidden services in the Tor network. In this paper, based on the frequent updates of hidden service descriptors, we proposed an approach to model Tor hidden service discovery as a generalized coupon collector problem with group drawings. Our experiments based on the real Tor network proved the efficiency and feasibility of the proposed model, which proved the possibility of harvesting most of hidden services with a small amount of resources.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
In [8], George Kadianakis et al. computed the fraction of descriptors that a HSDir is responsible for, and their results showed that the fraction value is very small (0.024%), and there is little difference for this value between different HSDirs.
References
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. Technical Report, DTIC Document (2004)
Biryukov, A., Pustogarov, I., Weinmann, R.: Trawling for Tor hidden services: detection, measurement, deanonymization. In: 2013 IEEE Symposium on Security and Privacy (SP), pp. 80–94. IEEE (2013)
Stadje, W.: The collector’s problem with group drawings. Adv. Appl. Probab. 22, 866–882 (1990)
https://gitweb.torproject.org/torspec.git/plain/rend-spec.txt
https://research.torproject.org/techreports/extrapolating-hidserv-stats-2015-01-31.pdf
Acknowledgments
This research is funded by National Key Research & Development Plan of China under Grant 2016YFB0801200, 2016YFB0801602 and 2016QY05X1000.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Liu, P. et al. (2018). A Quantitative Model for Analysis and Evaluation of Tor Hidden Service Discovery. In: Sun, G., Liu, S. (eds) Advanced Hybrid Information Processing. ADHIP 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 219. Springer, Cham. https://doi.org/10.1007/978-3-319-73317-3_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-73317-3_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-73316-6
Online ISBN: 978-3-319-73317-3
eBook Packages: Computer ScienceComputer Science (R0)