[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-talk] Content and popularity analysis of Tor hidden services
http://cryptome.org/2013/09/tor-analysis-hidden-services.pdf
Content and popularity analysis of Tor hidden services
July 29, 2013
Alex Biryukov
University of Luxembourg alex.biryukov@xxxxxx
Ivan Pustogarov University of Luxembourg ivan.pustogarov@xxxxxx
Ralf-Philipp Weinmann University of Luxembourg ralf-philipp.weinmann@xxxxxx
ABSTRACT
Tor hidden services allow running Internet services while protecting the
location of the servers. Their main purpose is to enable freedom of speech
even in situations in which powerful adversaries try to suppress it. However,
providing location privacy and client anonymity also makes Tor hidden
services an attractive platform for every kind of imaginable shady service.
The ease with which Tor hidden services can be set up has spurred a huge
growth of anonymously provided Internet services of both types. In this paper
we analyse the landscape of Tor hidden services. We have studied Tor hidden
services after collecting 39824 hidden service descriptors on 4th of Feb 2013
by exploiting protocol and implementation aws in Tor: we scanned them for
open ports; in the case of HTTP services, we analysed and classified their
content. We also estimated the popularity of hidden services by looking at
the request rate for hidden service descriptors by clients. We found that
while the content of Tor hidden services is rather varied, the most popular
hidden services are related to botnets.
Keywords
Tor, hidden services, port scanning, classification
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk