Celllls breaks tthe Tor’’s Anonymiitty:: Oniion Routter

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1

Abstract

 To hide the communication of users, the anonymity systems pack the application data into equal – sized cells. The size of IP packets in the Tor network can be very dynamic and the IP layer may be repack cells. A new cell-counting attack against Tor allows the attacker to confirm anonymous communication relationship among users very quickly. By varying the number of cells in the target traffic at the malicious exit onion router, the attacker can embed a secrete signal into variation of cell counter of the target traffic and it will be carried and arrive at the malicious entry onion router. Then an accomplice of the attacker will detect the signal based on received cells and confirm the communication among the users. There are several features of this attack. First, it is highly efficient and confirms very short communication session with only tens of cells. Second, this attack is effective and detection rate approaches 100% with a very low false positive rate. Third, it is possible to implement the attack in a way that appears to be very difficult for honest participants to detect.

Authors and Affiliations

Ms. S. Sivaranjani

Keywords

Related Articles

Classifying Product Quality Depending on Online Aspect Reviews

Abstract:According to any individual living in today’s world what is the most important thing that one does before buying any product? Blindly we say that it’s checking out the number of online reviews about the product...

 Frequent Itemset-based Text Clustering Approach to Cluster Ranked Documents

 Abstract: In most of the search engines documents are retrieved and ranked on the basis of relevance. They are not necessarily ranked on the basis of similarity between the query and the respective document. The ra...

 Regression Test Case Selection &PrioritizationUsing Dependence Graph and Genetic Algorithm

 Abstract: Regression testing is very important process in software maintenance. Unfortunately, it iscostly and time consumingto allow for the re-execution of all test cases during regression testing. The challenge...

 Gesture mimicking two Wheeler differential drive Arduino based robot and iRobot Create

Abstract: The project discussed here is a gesture controlled robot having two wheels on either side just like a car. The key features described in the project are i) controlling the movement of the wheels using an embedd...

Download PDF file
  • EP ID EP157391
  • DOI -
  • Views 82
  • Downloads 0

How To Cite

Ms. S. Sivaranjani (2014).  Celllls breaks tthe Tor’’s Anonymiitty:: Oniion Routter. IOSR Journals (IOSR Journal of Computer Engineering), 16(1), 1-4. https://europub.co.uk/articles/-A-157391