We downloaded and processed ten years of historic log data from the Tor project. Then we used boosted regression trees and generalized linear models to predict malicious exit nodes.
machine-learning
privacy
tor
anonymity
tor-network
relay-server
boosted-trees
tor-servers
tor-nodes
tor-consensus-files
-
Updated
May 31, 2017 - R