{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T23:30:58Z","timestamp":1725751858853},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 62162060"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,3]]},"DOI":"10.1145\/3507509.3507512","type":"proceedings-article","created":{"date-parts":[[2022,3,7]],"date-time":"2022-03-07T12:10:31Z","timestamp":1646655031000},"page":"21-26","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["TNRAS: Tor Nodes Reliability Analysis Scheme"],"prefix":"10.1145","author":[{"given":"Wenzhen","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Computer Science (National Pilot Software Engineering School), Beijing University of Posts and Telecommunications, China and Key Laboratory of Trustworthy Distributed Computing and Service (BUPT), Beijing University of Posts and Telecommunications, China"}]},{"given":"Tianbo","family":"Lu","sequence":"additional","affiliation":[{"name":"School of Computer Science (National Pilot Software Engineering School),School of Cyberspace Security, Beijing University of Posts and Telecommunications, China and Key Laboratory of Trustworthy Distributed Computing and Service (BUPT), Beijing University of Posts and Telecommunications, China"}]},{"given":"Zeyu","family":"Du","sequence":"additional","affiliation":[{"name":"School of Computer Science (National Pilot Software Engineering School), Beijing University of Posts and Telecommunications, China and Key Laboratory of Trustworthy Distributed Computing and Service (BUPT), Beijing University of Posts and Telecommunications, China"}]}],"member":"320","published-online":{"date-parts":[[2022,3,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/BROADNETS.2004.8"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"R. Dingledine N. Mathewson and P. Syverson. 2004.Tor: The Second-Generation Onion Router. USENIX security symposium August 2004. R. Dingledine N. Mathewson and P. Syverson. 2004.Tor: The Second-Generation Onion Router. USENIX security symposium August 2004.","DOI":"10.21236\/ADA465464"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_2_1_4_1","first-page":"3","volume-title":"IEEE symposium on security and privacy","author":"Yu H.","unstructured":"H. Yu , P. B. Gibbons , M. Kaminsky , and F. Xiao . 2008. Sybillimit: A near-optimal social network defense against sybil attacks . IEEE symposium on security and privacy , pp. 3 - 17 . H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao. 2008. Sybillimit: A near-optimal social network defense against sybil attacks. IEEE symposium on security and privacy, pp.3-17."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3463676.3485609"},{"key":"e_1_3_2_1_6_1","first-page":"328","volume-title":"Detection of Sybil Attack on Tor Resource Distribution. In 2020 IEEE International Conference on Power, Intelligent Computing and Systems (ICPICS)","author":"Ge K.","year":"2020","unstructured":"K. Ge , Y. He . 2020 . Detection of Sybil Attack on Tor Resource Distribution. In 2020 IEEE International Conference on Power, Intelligent Computing and Systems (ICPICS) , pp. 328 - 332 . IEEE. K. Ge, Y. He. 2020. Detection of Sybil Attack on Tor Resource Distribution. In 2020 IEEE International Conference on Power, Intelligent Computing and Systems (ICPICS), pp. 328-332. IEEE."},{"key":"e_1_3_2_1_7_1","first-page":"304","volume-title":"International symposium on privacy enhancing technologies symposium","author":"Winter P.","unstructured":"P. Winter , R. K\u00f6wer , M. Mulazzani , M. Huber , S. Schrittwieser , S. Lindskog , and E. Weippl . 2014. Spoiled onions: Exposing malicious Tor exit relays . International symposium on privacy enhancing technologies symposium , Springer, Cham , pp. 304 - 331 . P. Winter, R. K\u00f6wer, M. Mulazzani, M. Huber, S. Schrittwieser, S. Lindskog, and E. Weippl. 2014. Spoiled onions: Exposing malicious Tor exit relays. International symposium on privacy enhancing technologies symposium, Springer, Cham, pp.304-331."},{"key":"e_1_3_2_1_8_1","first-page":"263","volume-title":"ACM SIGSAC conference on computer and communications security","author":"Juarez M.","unstructured":"M. Juarez , S. Afroz , G. Acar , C. Diaz , and R. Greenstadt . 2014. A critical evaluation of website fingerprinting attacks . ACM SIGSAC conference on computer and communications security , New York , pp. 263 - 274 . M. Juarez, S. Afroz, G. Acar, C. Diaz, and R. Greenstadt. 2014. A critical evaluation of website fingerprinting attacks. ACM SIGSAC conference on computer and communications security, New York, pp.263-274."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Z. Ling J. Luo W. Yu M. Yang and X. Fu. 2013. Tor bridge discovery: extensive analysis and large-scale empirical evaluation. IEEE transctions on parallel and distributed systems vol.26 no.7 pp.1887-1899. Z. Ling J. Luo W. Yu M. Yang and X. Fu. 2013. Tor bridge discovery: extensive analysis and large-scale empirical evaluation. IEEE transctions on parallel and distributed systems vol.26 no.7 pp.1887-1899.","DOI":"10.1109\/TPDS.2013.249"},{"key":"e_1_3_2_1_10_1","first-page":"337","volume-title":"ACM SIGSAC conference on computer communications security","author":"Johnson A.","unstructured":"A. Johnson , C. Wacek , R. Jansen , M. Sherr , and P. Syverson . 2013. Users get routed: Traffic correlation on Tor by realistic adversaries . ACM SIGSAC conference on computer communications security , New York , pp. 337 - 348 . A. Johnson, C. Wacek, R. Jansen, M. Sherr, and P. Syverson. 2013. Users get routed: Traffic correlation on Tor by realistic adversaries. ACM SIGSAC conference on computer communications security, New York, pp.337-348."},{"key":"e_1_3_2_1_11_1","first-page":"80","volume-title":"IEEE Symposium on security and privacy","author":"Alex B.","unstructured":"B. Alex , I. Pustogarov , and R.P. Weinmann . 2013. Trawling for tor hidden services: detection, measurement, deanonymization . IEEE Symposium on security and privacy , pp. 80 - 94 . B. Alex, I. Pustogarov, and R.P. Weinmann. 2013. Trawling for tor hidden services: detection, measurement, deanonymization. IEEE Symposium on security and privacy, pp.80-94."},{"key":"e_1_3_2_1_12_1","first-page":"11","volume-title":"ACM workshop on privacy in electronic society","author":"Bauer K.","unstructured":"K. Bauer , D. McCoy , D. Grunwald , T. Kohno and D. Sicker . 2007. Low-resource routing attacks against tor . ACM workshop on privacy in electronic society , New York , pp. 11 - 20 . K. Bauer, D. McCoy, D. Grunwald, T. Kohno and D. Sicker. 2007. Low-resource routing attacks against tor. ACM workshop on privacy in electronic society, New York, pp.11-20."},{"key":"e_1_3_2_1_13_1","unstructured":"R. Dingledine and N. Mathewson. 2008. Tor path specification. URL: https:\/\/gitweb.torproject.org\/torspec.git\/tree\/pathspec.txt. R. Dingledine and N. Mathewson. 2008. Tor path specification. URL: https:\/\/gitweb.torproject.org\/torspec.git\/tree\/pathspec.txt."},{"key":"e_1_3_2_1_14_1","unstructured":"A. K. Pal D. Nath and S. Chakraborty. 2010. A discriminatory rewarding mechanism for Sybil detection with applications to Tor. World academy of science engineering and technology international journal of social behavioral educational economic business and industrial engineering vol.4 pp.152-159. A. K. Pal D. Nath and S. Chakraborty. 2010. A discriminatory rewarding mechanism for Sybil detection with applications to Tor. World academy of science engineering and technology international journal of social behavioral educational economic business and industrial engineering vol.4 pp.152-159."},{"key":"e_1_3_2_1_15_1","first-page":"1169","volume-title":"USENIX Security Symposium","author":"Winter P.","unstructured":"P. Winter , R. Ensafi , K. Loesing , and N. Feamster . 2016. Identifying and characterizing Sybils in the Tor network . USENIX Security Symposium , pp. 1169 - 1185 . P. Winter, R. Ensafi, K. Loesing, and N. Feamster. 2016. Identifying and characterizing Sybils in the Tor network. USENIX Security Symposium, pp.1169-1185."},{"key":"e_1_3_2_1_16_1","first-page":"147","volume-title":"ACM conference on applications, technologies, architectures, and protocols for computer communications","author":"Godfrey P. B.","unstructured":"P. B. Godfrey , S. Shenker , and I. Stoica . 2006. Minimizing churn in distributed systems . ACM conference on applications, technologies, architectures, and protocols for computer communications , New York , pp. 147 - 158 . P. B. Godfrey, S. Shenker, and I. Stoica. 2006. Minimizing churn in distributed systems. ACM conference on applications, technologies, architectures, and protocols for computer communications, New York, pp.147-158."},{"key":"e_1_3_2_1_17_1","first-page":"707","volume-title":"Binary codes capable of correcting deletions, insertions, and reversals. Soviet physics doklady","author":"Levenshtein V. I.","unstructured":"V. I. Levenshtein . 1966. Binary codes capable of correcting deletions, insertions, and reversals. Soviet physics doklady , vol. 10 , no.8, pp. 707 - 710 . V. I. Levenshtein. 1966. Binary codes capable of correcting deletions, insertions, and reversals. Soviet physics doklady, vol.10, no.8, pp. 707-710."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355122"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20307"},{"key":"e_1_3_2_1_20_1","first-page":"1","volume-title":"Torflow: Tor network analysis. Hot topics in privacy enhancing technologies","author":"Mike P.","unstructured":"P. Mike . 2009. Torflow: Tor network analysis. Hot topics in privacy enhancing technologies , pp. 1 - 14 . P. Mike. 2009. Torflow: Tor network analysis. Hot topics in privacy enhancing technologies, pp.1-14."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2020.1732440"}],"event":{"name":"ICCNS 2021: 2021 the 11th International Conference on Communication and Network Security","acronym":"ICCNS 2021","location":"Weihai China"},"container-title":["2021 the 11th International Conference on Communication and Network Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3507509.3507512","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,14]],"date-time":"2023-04-14T19:57:20Z","timestamp":1681502240000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3507509.3507512"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,3]]},"references-count":21,"alternative-id":["10.1145\/3507509.3507512","10.1145\/3507509"],"URL":"https:\/\/doi.org\/10.1145\/3507509.3507512","relation":{},"subject":[],"published":{"date-parts":[[2021,12,3]]},"assertion":[{"value":"2022-03-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}