CollecTor. https://collector.torproject.org/. Accessed 04/27/2015.
 GeoLite Autonomous System Number Database, April 2014. http://www.maxmind.com/app/asnum. Accessed 05/07/2014.
 The CAIDA UCSD IPv4 Routed /24 Topology Dataset- Jan 02–04, 2014, April 2014. http://www.caida.org/data/active/ipv4_routed_24_topology_dataset.xml. Accessed 05/07/2014.
 B. Ager, N. Chatzis, A. Feldmann, N. Sarrar, S. Uhlig, and W. Willinger. Anatomy of a large European IXP. In Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication, pages 163–174, 2012.Google Scholar
 M. Akhoondi, C. Yu, and H. Madhyastha. LASTor: A Low-Latency AS-Aware Tor Client. In Proceedings of the 2012 IEEE Symposium on Security and Privacy, pages 476–490, 2012.Google Scholar
 B. Augustin, X. Cuvellier, B. Orgogozo, F. Viger, T. Friedman, M. Latapy, C. Magnien, and R. Teixeira. Avoiding traceroute anomalies with Paris traceroute. In Proceedings of the 6th ACM SIGCOMM conference on Internet Measurement Conference (IMC), pages 153–158, 2006.Google Scholar
 B. Augustin, B. Krishnamurthy, and W. Willinger. IXPs: mapped? In Proceedings of the 9th ACM SIGCOMM conference on Internet Measurement Conference (IMC), pages 336–349, 2009.Google Scholar
 K. Bauer, D. McCoy, D. Grunwald, T. Kohno, and D. Sicker. Low-Resource Routing Attacks Against Tor. In Proceedings of the Workshop on Privacy in the Electronic Society (WPES), 2007.Google Scholar
 R. Collon. Use of OSI IS-IS for Routing in TCP/IP and Dual Environments accessed 05/14/2015., December 1990. https://www.ietf.org/rfc/rfc1195.txt Accessed 05/14/2015.
 I. Cunha, R. Teixeira, D. Veitch, and C. Diot. DTrack: A System to Predict and Track Internet Path Changes. IEEE/ACM Transactions on Networking, 22(4):1025–1038, 2014.CrossrefWeb of ScienceGoogle Scholar
 G. Danezis and P. Syverson. Bridging and Fingerprinting: Epistemic Attacks on Route Selection. In Proceedings of the 8th International Symposium on Privacy Enhancing Technologies Symposium (PETS), 2008.Google Scholar
 R. Dingledine, N. Hopper, G. Kadianakis, and N. Mathewson. One fast guard for life (or 9 months). In 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs), 2014.Google Scholar
 R. Dingledine, N. Mathewson, and P. Syverson. Tor: The Second-Generation Onion Router. In Proceedings of the 13th USENIX Security Symposium, 2004.Google Scholar
 M. Edman and P. F. Syverson. AS-awareness in Tor Path Selection. In Proceedings of the 2009 ACM Conference on Computer and Communications Security (CCS), 2009.Google Scholar
 T. Elahi, K. Bauer, M. AlSabah, R. Dingledine, and I. Goldberg. Changing of the Guards: A Framework for Understanding and Improving Entry Guard Selection in Tor. In Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society (WPES), pages 43–54, 2012.Google Scholar
 N. Feamster and R. Dingledine. Location Diversity in Anonymity Networks. In Proceedings of the Workshop on Privacy in the Electronic Society (WPES), 2004.Google Scholar
 L. Gao. On Inferring Autonomous System Relationships in the Internet. IEEE/ACM Transactions on Networking, 9(6), 2001.Google Scholar
 A. D. Jaggard, A. Johnson, P. Syverson, and J. Feigenbaum. Representing Network Trust and Using It to Improve Anonymous Communication. In In 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs), 2014.Google Scholar
 X. Jin, W.-P. Yiu, S.-H. Chan, and Y. Wang. Network topology inference based on end-to-end measurements. IEEE Journal on Selected Areas in Communications, 24(12):2182–2195, 2006.Google Scholar
 A. Johnson, P. Syverson, R. Dingledine, and N. Mathewson. Trust-based Anonymous Communication: Adversary Models and Routing Algorithms. In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS), pages 175–186, 2011.Google Scholar
 A. Johnson, C. Wacek, R. Jansen, M. Sherr, and P. Syverson. Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries. In Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS), 2013.Google Scholar
 J. P. J. Juen. Protecting Anonymity in the Presence of Autonomous System and Internet Exchange Level Adversaries. Master’s thesis, University of Illinois, 2012. http://hdl.handle.net/2142/34363.
 M. Luckie. Scamper: a scalable and extensible packet prober for active measurement of the internet. In Proceedings of the 10th ACM SIGCOMM conference on Internet Measurement Conference (IMC), pages 239–245. ACM, 2010.Google Scholar
 M. Luckie, B. Huffaker, k. claffy, A. Dhamdhere, and V. Giotsas. AS Relationships, Customer Cones, and Validation. In Proceedings of the 13th ACM SIGCOMM Conference Internet Measurement Conference (IMC), 2013.Google Scholar
 M. Luckie, Y. Hyun, and B. Huffaker. Traceroute Probe Method and Forward IP Path Inference. In Proceedings of the 8th ACM SIGCOMM Conference on Internet Measurement Conference (IMC), 2008.Google Scholar
 G. Malkin. RIP Version 2, November 1998. https://tools.ietf.org/html/rfc2453.
 Z. M. Mao, J. Rexford, J. Wang, and R. H. Katz. Towards an Accurate AS-level Traceroute Tool. In Proceedings of the ACM SIGCOMM 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, 2003.Google Scholar
 J. Moy. RFC 2328: OSPF Version 2, April 1998. http://www.ietf.org/rfc/rfc2328.txt. Accessed 05/14/2015.
 S. J. Murdoch and P. Zieliński. Sampled Traffic Analysis by Internet-Exchange-Level Adversaries. In Proceedings of the Seventh Workshop on Privacy Enhancing Technologies Symposium (PETS), 2007.Google Scholar
 J. Qiu and L. Gao. AS Path Inference by Exploiting Known AS Paths. In In Proceedings of IEEE GLOBECOM, 2006.Google Scholar
 Y. Rekhter, T. Li, and S. Hares. A Border Gateway Protocol 4 (BGP-4), January 2006. https://www.ietf.org/rfc/rfc4271.txt Accessed 05/14/2015.
 P. Syverson, G. Tsudik, M. Reed, and C. Landwehr. Towards an Analysis of Onion Routing Security. In Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 96–114, 2000.Google Scholar
 L. Vanbever, O. Li, J. Rexford, and P. Mittal. Anonymity on QuickSand: Using BGP to Compromise Tor. In Proceedings of the 13th ACM Workshop on Hot Topics in Networks (HotNet), 2014.Google Scholar
 C. Wacek, H. Tan, K. S. Bauer, and M. Sherr. An Empirical Evaluation of Relay Selection in Tor. In Network and Distributed System Security (NDSS), 2013.Google Scholar
 Y. Zhang, R. Oliveira, Y. Wang, S. Su, B. Zhang, J. Bi, H. Zhang, and L. Zhang. A framework to quantify the pitfalls of using traceroute in AS-level topology measurement. IEEE Journal on Selected Areas in Communications, 29(9):1822–1836, 2011.Web of ScienceGoogle Scholar
 Y. Zhang, V. Paxson, and S. Shenker. The Stationarity of Internet Path Properties: Routing, Loss, and Throughput. Technical report, In ACIRI Technical Report, 2000. https://www.cs.utexas.edu/~yzhang/papers/station-tr00.pdf.
About the article
Published Online: 2015-06-22
Published in Print: 2015-06-01
Citation Information: Proceedings on Privacy Enhancing Technologies, Volume 2015, Issue 2, Pages 171–187, ISSN (Online) 2299-0984, DOI: https://doi.org/10.1515/popets-2015-0021.
© Joshua Juen et al.. This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License. BY-NC-ND 3.0