Security against attacks in TOR networks

Abstract

TOR( The Onion Router) network is a system that provide anonymity for its client by routing the client packets via various volunteering networks, such routing conceals the clients location & activity thus making traffic analysis or network surveillances impossible by the intruders, hence TOR is widely used network for purpose such as personal freedom, secure communication & confidential business. Yet there are vulnerable flaws in the nodes & routing that can be utilized by intruders to de-anonymize the network & monitoring the whole network, such attacks can be avoided by conducting simple measures making TOR more secure & attack resistant because “Prevention is always better than cure”.

Authors and Affiliations

Vijaya Lakshmi. V

Keywords

Related Articles

Secondary Structure Prediction Using ANN Learning

This paper presents two methods for predicting the secondary structure of proteins based on artificial neural network learning. Two variations of NN learning rule are employed using feedforward backpropogation architectu...

A Symmetric FHE Scheme Based on Linear Algebra

FHE is considered to be Holy Grail of cloud computing. Many applications of cloud computing inherently need symmetric keys while very few FHE schemes have been proposed with symmetric keys. Even with the schemes based on...

Cosine Similarity Function For The Temporal Dynamic Web Data

Cosine similarity function is one of the most popular similarity function for handling the web data in various applications such as recommender system, collaborative filtering algorithms, classification algorithms, etc....

Efficient Color Tracking from Images and Real time Video

Recent trends in technology aim to build highly interactive and easy to use applications using non conventional interaction devices such as Web Cam, Projector, Data Gloves etc. Among them Web Cam can be used for developm...

A Novel Approach to Recognize the off-line Handwritten Numerals using MLP and SVM Classifiers

This paper presents a new approach to off-line handwritten numeral recognition. Recognition of handwritten numerals has been one of the most challenging task in pattern recognition. Recognition of handwritten numerals po...

Download PDF file
  • EP ID EP135256
  • DOI -
  • Views 125
  • Downloads 0

How To Cite

Vijaya Lakshmi. V (2012). Security against attacks in TOR networks. International Journal of Computer Science & Engineering Technology, 3(1), 1-5. https://europub.co.uk/articles/-A-135256