TY - JOUR T1 - Traffic Analysis of Anonymity Protocol using HMM-Based Trust Model AU - H. Sulaiman, Yousif JO - Journal of Engineering and Applied Sciences VL - 15 IS - 11 SP - 2390 EP - 2397 PY - 2020 DA - 2001/08/19 SN - 1816-949x DO - jeasci.2020.2390.2397 UR - https://makhillpublications.co/view-article.php?doi=jeasci.2020.2390.2397 KW - Tor anonymity network KW -web safety KW -intruder detection system KW -traffic studies AB - The implementation of a traffic attack in order to Tor network analysis is considered in this study. Tor performance and previous attacks against Tor network by other researchers presented in the references were studied. This gives us some insight into the growth in popularity of the anonymity network. Then the experimental environment is set up and the experimental procedure is built. The results of the experiment indicate the need for setting the model confidence for the analysis of anonymity protocol. The effectiveness of the suggested algorithm based trust model is demonstrated by calculating the amount of training data set required for the output of wireless access protocol proxies through Tor. ER -