Novel Approach To Cell-Counting-Based Attack Against Tor
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 10
Abstract
Different low-latency unidentified communication systems such as Tor and Anonymizer have been deliberate to make available anonymity service for users. In order to hide from view the communication of users, most of the secrecy systems pack the application data into equal-sized cells. Through extensive experiments on Tor, we originate that the size of IP packets in the Tor network can be very active because a cell is an application concept and the IP layer may repack cells. Based on that, we consider a new cellcounting-based attack against Tor, which allows the attacker to substantiate anonymous communication association among users very quickly. In this attack, by slightly unreliable the number of cells in the target traffic at the malicious exit onion router, the attacker can embed a furtive signal into the dissimilarity of cell counter of the target traffic. The entrenched signal will be carried along with the target traffic and reach your destination at the malicious entry onion router. Then, an accessory of the attacker at the malicious entry onion router will identify the surrounded signal based on the received cells and confirm the communication connection among users. We have executed this attack against Tor, and our investigational data validate its possibility and effectiveness. There are several exclusive features of this attack. First, this attack is extremely efficient and can confirm very short communication sessions with only tens of cells. Second, the attack is effective, and its detection rate approaches 100% with a very low fake positive rate. Third, it is feasible to implement the attack in a way that comes into view to be very tricky for honest participants to detect.
Authors and Affiliations
K. Venkateswarlu, S. Srinivasulu, N. Rajya Lakshmi
A Technique To Solve Real-World Problems In Text Classification, Computer Vision, And Bioinformatics
The key confront of online feature selection is how to create precise prediction for an example by means of a small number of active features. This is in difference to the traditional setup of online knowledge where a...
Alcohol Detection System
This system provides a unique method to curb drunken people. The system has an alcohol sensor embedded on the steering of the car. Whenever the driver starts ignition, the sensor measures the content of the alcohol i...
Voice and Gesture Based Electric-Powered Wheelchair Using ARM
A voice and gesture based system has been developed to control a wheelchair using voice commands and moment of hand i.e. Mems sensor is connected to hand. The system is divided into two main components: speech recogni...
A Novel Survey on SLA based Load leveling in Cloud Computing
The provision of Virtual Machines (VMs) in cloud is one major concern of cloud computing. Cloud Computing is nothing however a group of computing resources and services pooled along and is provided to the users on pay...
Low Power 10 PAM Transmitter Using Mixed Signal Design Approach
The mixed signal design approach for 10- level pulse amplitude modulation (10-PAM) transmitter which transmit 4-bit per symbol. The frequency is reduced thereby the power dissipation is greatly reduced. The data rate...