Security against attacks in TOR networks

Abstract

TOR( The Onion Router) network is a system that provide anonymity for its client by routing the client packets via various volunteering networks, such routing conceals the clients location & activity thus making traffic analysis or network surveillances impossible by the intruders, hence TOR is widely used network for purpose such as personal freedom, secure communication & confidential business. Yet there are vulnerable flaws in the nodes & routing that can be utilized by intruders to de-anonymize the network & monitoring the whole network, such attacks can be avoided by conducting simple measures making TOR more secure & attack resistant because “Prevention is always better than cure”.

Authors and Affiliations

Vijaya Lakshmi. V

Keywords

Related Articles

Human Computer Interface Through Biometric Iris Recognition System

Biometric recognition system is better reliable, roubst technique than traditional recognition system. Biometric iris recognition system is most secure and reliable than other biometric recognition system. Hence, we use...

Web User Session Cluster Discovery Based on k-Means and k-Medoids Techniques

The explosive growth of World Wide Web (WWW) has necessitated the development of Web personalization systems in order to understand the user preferences to dynamically serve customized content to individual users. To rev...

EQUALITY IN BETWEEN ITERATIVE SOFT DILATION AND ITERATIVE SOFT CLOSE IN MULTI SCALE ENVIRONMENT

In this paper, equality is established and discussed in between soft dilation and soft close in multi scale environment as well as in iterative environment. Soft erosion and soft dilation will exist for various threshold...

Enhancing Efficiency and Accuracy of Imbalanced Datasets Using Fuzzy Neural Network

In Data Mining the class Imbalance classification problem is considered to be one of the emergent challenges. This problem occurs when the number of examples that represents one of the classes of the dataset is much lowe...

Identification of Single Nucleotide Polymorphisms and associated Disease Genes using NCBI resources

Single Nucleotide Polymorphisms (SNP) are the most common and simplest form of variation associated with genetic diseases. SNPs are responsible for more than half of the genetic polymorphisms known to cause inherited dis...

Download PDF file
  • EP ID EP135256
  • DOI -
  • Views 114
  • Downloads 0

How To Cite

Vijaya Lakshmi. V (2012). Security against attacks in TOR networks. International Journal of Computer Science & Engineering Technology, 3(1), 1-5. https://europub.co.uk/articles/-A-135256