Security against attacks in TOR networks
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2012, Vol 3, Issue 1
Abstract
TOR( The Onion Router) network is a system that provide anonymity for its client by routing the client packets via various volunteering networks, such routing conceals the clients location & activity thus making traffic analysis or network surveillances impossible by the intruders, hence TOR is widely used network for purpose such as personal freedom, secure communication & confidential business. Yet there are vulnerable flaws in the nodes & routing that can be utilized by intruders to de-anonymize the network & monitoring the whole network, such attacks can be avoided by conducting simple measures making TOR more secure & attack resistant because “Prevention is always better than cure”.
Authors and Affiliations
Vijaya Lakshmi. V
CRM Based On Naive-Bayesian Classification
CRM is a combination of several components. The companies can process the customer information before beginning the process. Companies can acquire about their customers through their internal customer information or they...
RDF method to improve ontology using RDF algorithm
A Relation description frame work we used semantic based collections using crawlers. The semantic matching and relevancy are made and improved results are obtained. RDF helps us to generate a hierarchy based tree structu...
A Study on signcryption Scheme Based on Eliptic Curve
Data exchange is more essential to share information in the age of information technology to achieve the different tasks. As the transmission media is unreliable it need protection of that data moves in an unsecure commu...
PERFORMANCE, ANALYSIS OF H.264/AVC LOSELESS VIDEO CODING USING HADAMARD TRANSFORM
An efficient lossless video codec based on H.264/AVC uses the Hadamard transform and adaptive truncation (HTAT).Transforms in their coding procedures are mostly video lossless coding algorithms. The HTAT method has adopt...
Privacy Preserving Data Mining in Electronic Health Record using Kanonymity and Decision Tree
In this paper, we present an accurate and efficient privacy preserving data mining technique in Electronic Health Record (EHR) by using k –anonymity and decision tree C4.5 that is useful to generate pattern for medical r...