I am not sure just what you are calling an "attack". Is it a connection attempt? A probe? A port test?

Also, a heads up... saying "So if you would try to DOS my system, you will probably end up trying without success." is like a call to action. Be careful what you ask for. A DOS on your system would actually be trivial for many people. I dare think ebay and certain unamed government agencies have quite robust systems and sophisticated levels of protection, yet if I am not mistaken they have succumbed to DoS attacks.

That aside, you have some interesting graphs. Trouble is I do not understand what they reveal. Is there a vulnerability design of Tor or the network?

On 11/8/2013 12:19 PM, elrippo wrote:
Hy there.

I did some graphs of the attacks raiding against the network and the method is 
quite interesting.

Take a look at it, maybe it helps a bit.

https://elrippoisland.net/public/tor_attack/attack.html



_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays