I am not sure just what you are calling
an "attack". Is it a connection attempt? A probe? A port test?
Also, a heads up... saying "So if you would try to DOS my system,
you will probably end up trying without success." is like a call
to action. Be careful what you ask for. A DOS on your system would
actually be trivial for many people. I dare think ebay and certain
unamed government agencies have quite robust systems and
sophisticated levels of protection, yet if I am not mistaken they
have succumbed to DoS attacks.
That aside, you have some interesting graphs. Trouble is I do not
understand what they reveal. Is there a vulnerability design of
Tor or the network?
On 11/8/2013 12:19 PM, elrippo wrote:
Hy there.
I did some graphs of the attacks raiding against the network and the method is
quite interesting.
Take a look at it, maybe it helps a bit.
https://elrippoisland.net/public/tor_attack/attack.html
_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays