Skip to content
Back to outputs

Empirical analysis of Tor hidden services

Research output: Contribution to journalArticle

Standard

Empirical analysis of Tor hidden services. / Owenson, Gareth Huw; Savage, Nicholas John.

In: IET Information Security, Vol. 10, No. 3, 01.05.2016, p. 113-118.

Research output: Contribution to journalArticle

Harvard

APA

Vancouver

Author

Owenson, Gareth Huw ; Savage, Nicholas John. / Empirical analysis of Tor hidden services. In: IET Information Security. 2016 ; Vol. 10, No. 3. pp. 113-118.

Bibtex

@article{309104be8c3144989ed3ab1be058ffe8,
title = "Empirical analysis of Tor hidden services",
abstract = "Tor hidden services allow someone to host a website or other transmission control protocol (TCP) service whilst remaining anonymous to visitors. The collection of all Tor hidden services is often referred to as the ‘darknet’. In this study, the authors describe results from what they believe to be the largest study of Tor hidden services to date. By operating a large number of Tor servers for a period of 6 months, the authors were able to capture data from the Tor distributed hash table to collect the list of hidden services, classify their content and count the number of requests. Approximately 80,000 hidden services were observed in total of which around 45,000 are present at any one point in time. Abuse and Botnet C&C servers were the most frequently requested hidden services although there was a diverse range of services on offer.",
keywords = "Tor, hidden services",
author = "Owenson, {Gareth Huw} and Savage, {Nicholas John}",
note = "Confirmation from Gareth in openaccess inbox that the post-print isn't available.",
year = "2016",
month = "5",
day = "1",
doi = "10.1049/iet-ifs.2015.0121",
language = "English",
volume = "10",
pages = "113--118",
journal = "IET Information Security",
issn = "1751-8709",
publisher = "Institution of Engineering and Technology",
number = "3",

}

RIS

TY - JOUR

T1 - Empirical analysis of Tor hidden services

AU - Owenson, Gareth Huw

AU - Savage, Nicholas John

N1 - Confirmation from Gareth in openaccess inbox that the post-print isn't available.

PY - 2016/5/1

Y1 - 2016/5/1

N2 - Tor hidden services allow someone to host a website or other transmission control protocol (TCP) service whilst remaining anonymous to visitors. The collection of all Tor hidden services is often referred to as the ‘darknet’. In this study, the authors describe results from what they believe to be the largest study of Tor hidden services to date. By operating a large number of Tor servers for a period of 6 months, the authors were able to capture data from the Tor distributed hash table to collect the list of hidden services, classify their content and count the number of requests. Approximately 80,000 hidden services were observed in total of which around 45,000 are present at any one point in time. Abuse and Botnet C&C servers were the most frequently requested hidden services although there was a diverse range of services on offer.

AB - Tor hidden services allow someone to host a website or other transmission control protocol (TCP) service whilst remaining anonymous to visitors. The collection of all Tor hidden services is often referred to as the ‘darknet’. In this study, the authors describe results from what they believe to be the largest study of Tor hidden services to date. By operating a large number of Tor servers for a period of 6 months, the authors were able to capture data from the Tor distributed hash table to collect the list of hidden services, classify their content and count the number of requests. Approximately 80,000 hidden services were observed in total of which around 45,000 are present at any one point in time. Abuse and Botnet C&C servers were the most frequently requested hidden services although there was a diverse range of services on offer.

KW - Tor

KW - hidden services

U2 - 10.1049/iet-ifs.2015.0121

DO - 10.1049/iet-ifs.2015.0121

M3 - Article

VL - 10

SP - 113

EP - 118

JO - IET Information Security

T2 - IET Information Security

JF - IET Information Security

SN - 1751-8709

IS - 3

ER -

ID: 4192109