Abstract
Tor anonymous network is to protect the privacies of the users in the Internet. In this paper, our goal is to research what potential security risks and vulnerabilities we will encounter when using Tor anonymous network. We try to find some determined results from the perspective of an attacker. Using the system architecture of Tor anonymous network and combining the concept of man-in-the-middle (MITM) attack, we design a system for experiments to instigate the attacks in practice. Finally, we discuss and analyze the potential security threats and risks of using Tor anonymous network based on our results of experiments.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have