CollecTor. https://collector.torproject.org/. Accessed 04/27/2015.
 GeoLite Autonomous System Number Database, April 2014. http://www.maxmind.com/app/asnum. Accessed 05/07/2014.
 The CAIDA UCSD IPv4 Routed /24 Topology Dataset- Jan 02–04, 2014, April 2014. http://www.caida.org/data/active/ipv4_routed_24_topology_dataset.xml. Accessed 05/07/2014.
 B. Ager, N. Chatzis, A. Feldmann, N. Sarrar, S. Uhlig, and W. Willinger. Anatomy of a large European IXP. In Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication, pages 163–174, 2012.
 M. Akhoondi, C. Yu, and H. Madhyastha. LASTor: A Low-Latency AS-Aware Tor Client. In Proceedings of the 2012 IEEE Symposium on Security and Privacy, pages 476–490, 2012.
 B. Augustin, X. Cuvellier, B. Orgogozo, F. Viger, T. Friedman, M. Latapy, C. Magnien, and R. Teixeira. Avoiding traceroute anomalies with Paris traceroute. In Proceedings of the 6th ACM SIGCOMM conference on Internet Measurement Conference (IMC), pages 153–158, 2006.
 B. Augustin, B. Krishnamurthy, and W. Willinger. IXPs: mapped? In Proceedings of the 9th ACM SIGCOMM conference on Internet Measurement Conference (IMC), pages 336–349, 2009.
 K. Bauer, D. McCoy, D. Grunwald, T. Kohno, and D. Sicker. Low-Resource Routing Attacks Against Tor. In Proceedings of the Workshop on Privacy in the Electronic Society (WPES), 2007.
 R. Collon. Use of OSI IS-IS for Routing in TCP/IP and Dual Environments accessed 05/14/2015., December 1990. https://www.ietf.org/rfc/rfc1195.txt Accessed 05/14/2015.
 Í. Cunha, R. Teixeira, D. Veitch, and C. Diot. Predicting and tracking internet path changes. ACM SIGCOMM Computer Communication Review, 41(4):122–133, 2011. [Web of Science]
 I. Cunha, R. Teixeira, D. Veitch, and C. Diot. DTrack: A System to Predict and Track Internet Path Changes. IEEE/ACM Transactions on Networking, 22(4):1025–1038, 2014. [Crossref] [Web of Science]
 G. Danezis and P. Syverson. Bridging and Fingerprinting: Epistemic Attacks on Route Selection. In Proceedings of the 8th International Symposium on Privacy Enhancing Technologies Symposium (PETS), 2008.
 R. Dingledine, N. Hopper, G. Kadianakis, and N. Mathewson. One fast guard for life (or 9 months). In 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs), 2014.
 R. Dingledine, N. Mathewson, and P. Syverson. Tor: The Second-Generation Onion Router. In Proceedings of the 13th USENIX Security Symposium, 2004.
 M. Edman and P. F. Syverson. AS-awareness in Tor Path Selection. In Proceedings of the 2009 ACM Conference on Computer and Communications Security (CCS), 2009.
 T. Elahi, K. Bauer, M. AlSabah, R. Dingledine, and I. Goldberg. Changing of the Guards: A Framework for Understanding and Improving Entry Guard Selection in Tor. In Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society (WPES), pages 43–54, 2012.
 N. Feamster and R. Dingledine. Location Diversity in Anonymity Networks. In Proceedings of the Workshop on Privacy in the Electronic Society (WPES), 2004.
 L. Gao. On Inferring Autonomous System Relationships in the Internet. IEEE/ACM Transactions on Networking, 9(6), 2001.
 A. D. Jaggard, A. Johnson, P. Syverson, and J. Feigenbaum. Representing Network Trust and Using It to Improve Anonymous Communication. In In 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs), 2014.
 X. Jin, W.-P. Yiu, S.-H. Chan, and Y. Wang. Network topology inference based on end-to-end measurements. IEEE Journal on Selected Areas in Communications, 24(12):2182–2195, 2006.
 A. Johnson, P. Syverson, R. Dingledine, and N. Mathewson. Trust-based Anonymous Communication: Adversary Models and Routing Algorithms. In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS), pages 175–186, 2011.
 A. Johnson, C. Wacek, R. Jansen, M. Sherr, and P. Syverson. Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries. In Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS), 2013.
 J. P. J. Juen. Protecting Anonymity in the Presence of Autonomous System and Internet Exchange Level Adversaries. Master’s thesis, University of Illinois, 2012. http://hdl.handle.net/2142/34363.
 M. Luckie. Scamper: a scalable and extensible packet prober for active measurement of the internet. In Proceedings of the 10th ACM SIGCOMM conference on Internet Measurement Conference (IMC), pages 239–245. ACM, 2010.
 M. Luckie, B. Huffaker, k. claffy, A. Dhamdhere, and V. Giotsas. AS Relationships, Customer Cones, and Validation. In Proceedings of the 13th ACM SIGCOMM Conference Internet Measurement Conference (IMC), 2013.
 M. Luckie, Y. Hyun, and B. Huffaker. Traceroute Probe Method and Forward IP Path Inference. In Proceedings of the 8th ACM SIGCOMM Conference on Internet Measurement Conference (IMC), 2008.
 G. Malkin. RIP Version 2, November 1998. https://tools.ietf.org/html/rfc2453.
 Z. M. Mao, J. Rexford, J. Wang, and R. H. Katz. Towards an Accurate AS-level Traceroute Tool. In Proceedings of the ACM SIGCOMM 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, 2003.
 J. Moy. RFC 2328: OSPF Version 2, April 1998. http://www.ietf.org/rfc/rfc2328.txt. Accessed 05/14/2015.
 S. J. Murdoch and P. Zieliński. Sampled Traffic Analysis by Internet-Exchange-Level Adversaries. In Proceedings of the Seventh Workshop on Privacy Enhancing Technologies Symposium (PETS), 2007.
 J. Qiu and L. Gao. AS Path Inference by Exploiting Known AS Paths. In In Proceedings of IEEE GLOBECOM, 2006.
 Y. Rekhter, T. Li, and S. Hares. A Border Gateway Protocol 4 (BGP-4), January 2006. https://www.ietf.org/rfc/rfc4271.txt Accessed 05/14/2015.
 P. Syverson, G. Tsudik, M. Reed, and C. Landwehr. Towards an Analysis of Onion Routing Security. In Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 96–114, 2000.
 L. Vanbever, O. Li, J. Rexford, and P. Mittal. Anonymity on QuickSand: Using BGP to Compromise Tor. In Proceedings of the 13th ACM Workshop on Hot Topics in Networks (HotNet), 2014.
 C. Wacek, H. Tan, K. S. Bauer, and M. Sherr. An Empirical Evaluation of Relay Selection in Tor. In Network and Distributed System Security (NDSS), 2013.
 Y. Zhang, R. Oliveira, Y. Wang, S. Su, B. Zhang, J. Bi, H. Zhang, and L. Zhang. A framework to quantify the pitfalls of using traceroute in AS-level topology measurement. IEEE Journal on Selected Areas in Communications, 29(9):1822–1836, 2011. [Web of Science]
 Y. Zhang, V. Paxson, and S. Shenker. The Stationarity of Internet Path Properties: Routing, Loss, and Throughput. Technical report, In ACIRI Technical Report, 2000. https://www.cs.utexas.edu/~yzhang/papers/station-tr00.pdf.
Published Online: 2015-06-22
Published in Print: 2015-06-01
Citation Information: Proceedings on Privacy Enhancing Technologies. Volume 2015, Issue 2, Pages 171–187, ISSN (Online) 2299-0984, DOI: https://doi.org/10.1515/popets-2015-0021, June 2015
© Joshua Juen et al.. This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License. (CC BY-NC-ND 3.0)