منابع مشابه
Challenges in Protecting Tor Hidden Services from Botnet Abuse
In August 2013, the Tor network experienced a sudden, drastic reduction in performance due to the Mevade/Sefnit botnet. This botnet ran its command and control server as a Tor hidden service, so that all infected nodes contacted the command and control through Tor. In this paper, we consider several protocol changes to protect Tor against future incidents of this nature, describing the research...
متن کاملCircuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services
This paper sheds light on crucial weaknesses in the design of hidden services that allow us to break the anonymity of hidden service clients and operators passively. In particular, we show that the circuits, paths established through the Tor network, used to communicate with hidden services exhibit a very different behavior compared to a general circuit. We propose two attacks, under two slight...
متن کاملOff-path Man-in-the-Middle Attack on Tor Hidden Services
In the last decade, Tor proved to be a very successful and widely popular system to protect users’ anonymity. However, Tor remains a practical system with a variety of limitations, some of which were indeed exploited in the recent past. Previous work showed the existence of malicious participating Tor relays. In this work, we show that an adversary who compromises the Hidden Service private key...
متن کاملPhishing Detection based on Web Page Similarity
Phishing is a current social engineering attack that results in online identity theft. Phishing Web pages generally use similar page layouts, styles (font families, sizes, and so on), key regions, and blocks to mimic genuine pages in an effort to convince Internet users to divulge personal information, such as bank account numbers and passwords. A novel technique to visually compare an assumed ...
متن کاملPhishing Detection based on Visual-Similarity
Phishing is a form of online fraud that aims to steal a user’s sensitive information, such as online banking passwords or credit card numbers. The victim is tricked into entering such information on a web page that is crafted by the attacker so that it mimics a legitimate page. Recent statistics about the increasing number of phishing attacks suggest that this security problem still deserves si...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Forensic Science International: Digital Investigation
سال: 2021
ISSN: 2666-2817
DOI: 10.1016/j.fsidi.2021.301117