{"id":"https://openalex.org/W4386211587","doi":"https://doi.org/10.1109/iscc58397.2023.10218060","title":"A Comprehensive Evaluation of the Impact on Tor Network Anonymity Caused by ShadowRelay","display_name":"A Comprehensive Evaluation of the Impact on Tor Network Anonymity Caused by ShadowRelay","publication_year":2023,"publication_date":"2023-07-09","ids":{"openalex":"https://openalex.org/W4386211587","doi":"https://doi.org/10.1109/iscc58397.2023.10218060"},"language":"en","primary_location":{"id":"doi:10.1109/iscc58397.2023.10218060","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc58397.2023.10218060","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100751902","display_name":"Qingfeng Zhang","orcid":"https://orcid.org/0009-0001-5464-1335"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qingfeng Zhang","raw_affiliation_strings":["Institute of Information Engineering Chinese Academy of Sciences,Beijing,China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","Institute of Information Engineering Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering Chinese Academy of Sciences,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"Institute of Information Engineering Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101422977","display_name":"Jiawei Zhu","orcid":"https://orcid.org/0000-0002-5674-9200"},"institutions":[{"id":"https://openalex.org/I4210087772","display_name":"National Computer Network Emergency Response Technical Team/Coordination Center of Chinar","ror":"https://ror.org/00247dh76","country_code":"CN","type":"nonprofit","lineage":["https://openalex.org/I4210087772"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiawei Zhu","raw_affiliation_strings":["National Computer network Emergency Response technical Team/Coordination Center of China,Beijing,China","National Computer network Emergency Response technical Team/Coordination Center of China, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Computer network Emergency Response technical Team/Coordination Center of China,Beijing,China","institution_ids":["https://openalex.org/I4210087772"]},{"raw_affiliation_string":"National Computer network Emergency Response technical Team/Coordination Center of China, Beijing, China","institution_ids":["https://openalex.org/I4210087772"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043681640","display_name":"Muqian Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I4210087772","display_name":"National Computer Network Emergency Response Technical Team/Coordination Center of Chinar","ror":"https://ror.org/00247dh76","country_code":"CN","type":"nonprofit","lineage":["https://openalex.org/I4210087772"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Muqian Chen","raw_affiliation_strings":["National Computer network Emergency Response technical Team/Coordination Center of China,Beijing,China","National Computer network Emergency Response technical Team/Coordination Center of China, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Computer network Emergency Response technical Team/Coordination Center of China,Beijing,China","institution_ids":["https://openalex.org/I4210087772"]},{"raw_affiliation_string":"National Computer network Emergency Response technical Team/Coordination Center of China, Beijing, China","institution_ids":["https://openalex.org/I4210087772"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066857796","display_name":"Xuebin Wang","orcid":"https://orcid.org/0000-0002-0809-6014"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuebin Wang","raw_affiliation_strings":["Institute of Information Engineering Chinese Academy of Sciences,Beijing,China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","Institute of Information Engineering Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering Chinese Academy of Sciences,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"Institute of Information Engineering Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100713362","display_name":"Qingyun Liu","orcid":"https://orcid.org/0000-0003-4815-3463"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingyun Liu","raw_affiliation_strings":["Institute of Information Engineering Chinese Academy of Sciences,Beijing,China","Institute of Information Engineering Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering Chinese Academy of Sciences,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Institute of Information Engineering Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110292528","display_name":"Jinqiao Shi","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinqiao Shi","raw_affiliation_strings":["School of Cyberspace Security, Beijing University of Posts and Telecommunications,Beijing,China","School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications,Beijing,China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100751902"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.3497,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.6520546,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1369","last_page":"1375"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9864000082015991,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/relay","display_name":"Relay","score":0.8501838445663452},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.7923389077186584},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6930235028266907},{"id":"https://openalex.org/keywords/collusion","display_name":"Collusion","score":0.6792798638343811},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6052769422531128},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.5318301320075989},{"id":"https://openalex.org/keywords/shadow","display_name":"Shadow (psychology)","score":0.5092986822128296},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49767783284187317},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.4305625557899475},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.24207213521003723}],"concepts":[{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.8501838445663452},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.7923389077186584},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6930235028266907},{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.6792798638343811},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6052769422531128},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.5318301320075989},{"id":"https://openalex.org/C117797892","wikidata":"https://www.wikidata.org/wiki/Q286363","display_name":"Shadow (psychology)","level":2,"score":0.5092986822128296},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49767783284187317},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.4305625557899475},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.24207213521003723},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscc58397.2023.10218060","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc58397.2023.10218060","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.4399999976158142}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1655958391","https://openalex.org/W1820393415","https://openalex.org/W1950882734","https://openalex.org/W2171318529","https://openalex.org/W2484933080","https://openalex.org/W2888125116","https://openalex.org/W2963890727","https://openalex.org/W2964252542","https://openalex.org/W3007124107","https://openalex.org/W3104102522","https://openalex.org/W4205685179","https://openalex.org/W4285252588","https://openalex.org/W4288057717","https://openalex.org/W4288057785","https://openalex.org/W6695005619","https://openalex.org/W6774338936","https://openalex.org/W6806206367"],"related_works":["https://openalex.org/W2009938035","https://openalex.org/W3143020802","https://openalex.org/W1491837399","https://openalex.org/W3122232980","https://openalex.org/W2272761499","https://openalex.org/W2363272970","https://openalex.org/W2120306875","https://openalex.org/W1699588379","https://openalex.org/W3124704903","https://openalex.org/W2085964960"],"abstract_inverted_index":{"As":[0],"a":[1,86],"distributed":[2,65],"anonymous":[3],"network":[4],"run":[5],"by":[6,13,117,140],"volunteers,":[7],"Tor":[8,57,137],"relays":[9],"are":[10,27],"often":[11],"manipulated":[12],"operators":[14],"to":[15,29,37,127],"achieve":[16],"their":[17],"goals.":[18],"Our":[19],"work":[20],"reveals":[21],"that":[22,104],"some":[23],"relays,":[24],"named":[25],"ShadowRelay,":[26],"bound":[28],"hidden":[30,63],"nodes":[31,64],"and":[32,56,60,119],"actively":[33],"forward":[34],"user":[35,115],"traffic":[36,116,129],"the":[38,44,79,90,94,108,121,136,146],"next-hop":[39],"relay":[40,58,81],"or":[41],"target":[42],"without":[43],"user's":[45],"knowledge.":[46],"To":[47],"detect":[48],"ShadowRelays,":[49],"we":[50],"developed":[51],"HiddenSniffer":[52],"based":[53],"on":[54],"client":[55],"collusion,":[59],"found":[61],"162":[62],"across":[66],"22":[67],"countries,":[68],"along":[69],"with":[70,93],"85":[71],"Shadow":[72,91],"Relays":[73],"which":[74],"account":[75],"for":[76],"2.08%":[77],"of":[78,110,113,123,125],"total":[80],"bandwidth.":[82],"Additionally,":[83],"there":[84],"exists":[85],"family":[87,96],"relationship":[88],"among":[89],"Relays,":[92],"largest":[95],"containing":[97],"24":[98],"members.":[99],"The":[100],"experimental":[101],"results":[102],"indicate":[103],"ShadowRelays":[105,133],"have":[106],"increased":[107,142],"number":[109],"ASes":[111],"capable":[112],"sniffing":[114],"27.6%,":[118],"improved":[120],"ability":[122],"14.7%":[124],"attackers":[126],"launch":[128],"confirmation":[130],"attacks.":[131],"Furthermore,":[132],"adversely":[134],"impact":[135],"network's":[138],"availability":[139],"introducing":[141],"transmission":[143],"delay":[144],"within":[145],"circuits.":[147]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
