Tor and Anonymity Systems

  1. Security Analysis and Attacks
    1. Traffic Analysis Attacks
      1. End-to-End Correlation
        1. Timing Correlation
          1. Volume Correlation
            1. Pattern Matching
            2. Website Fingerprinting
              1. Traffic Pattern Analysis
                1. Machine Learning Approaches
                  1. Defense Mechanisms
                  2. Circuit Fingerprinting
                    1. Circuit Construction Patterns
                      1. Relay Selection Fingerprinting
                    2. Node-Level Attacks
                      1. Exit Node Attacks
                        1. Traffic Sniffing
                          1. Content Modification
                            1. SSL Stripping
                              1. Malicious Exit Behavior
                              2. Guard Node Attacks
                                1. Guard Discovery
                                  1. Guard Enumeration
                                    1. Long-term Observation
                                    2. Relay Compromise
                                      1. Malicious Relay Operation
                                        1. Key Extraction
                                          1. Traffic Manipulation
                                        2. Network-Level Attacks
                                          1. Sybil Attacks
                                            1. Relay Network Infiltration
                                              1. Path Selection Manipulation
                                                1. Consensus Manipulation
                                                2. Eclipse Attacks
                                                  1. Network Partitioning
                                                    1. Information Control
                                                    2. Denial of Service
                                                      1. Circuit-Level DoS
                                                        1. Relay-Level DoS
                                                          1. Network-Wide DoS
                                                        2. Protocol Vulnerabilities
                                                          1. Directory System Attacks
                                                            1. Directory Authority Compromise
                                                              1. Consensus Poisoning
                                                                1. Bandwidth Manipulation
                                                                2. Circuit-Level Vulnerabilities
                                                                  1. Circuit Hijacking
                                                                    1. Circuit Correlation
                                                                    2. Cell-Level Attacks
                                                                      1. Cell Counting
                                                                        1. Cell Timing
                                                                      2. Application-Level Attacks
                                                                        1. Browser Exploitation
                                                                          1. JavaScript Attacks
                                                                            1. Plugin Vulnerabilities
                                                                              1. Browser Fingerprinting
                                                                              2. DNS Leaks
                                                                                1. DNS Query Exposure
                                                                                  1. DNS Cache Poisoning
                                                                                  2. Time Zone Leaks
                                                                                    1. Plugin-Based Attacks
                                                                                    2. User Behavior Attacks
                                                                                      1. Operational Security Failures
                                                                                        1. Identity Correlation
                                                                                          1. Behavioral Patterns
                                                                                            1. Information Disclosure
                                                                                            2. Social Engineering
                                                                                              1. Cross-Protocol Attacks