We downloaded and processed ten years of historic log data from the Tor project. Then we used boosted regression trees and generalized linear models to predict malicious exit nodes.
machine-learning privacy tor anonymity tor-network relay-server boosted-trees tor-servers tor-nodes tor-consensus-files
-
Updated
May 31, 2017 - R