Fig. 7From: Tor network anonymity evaluation based on node anonymityComparison of the behavior base values of all RA when RA1 is under DDos attackBack to article page