Security against attacks in TOR networks

Abstract

TOR( The Onion Router) network is a system that provide anonymity for its client by routing the client packets via various volunteering networks, such routing conceals the clients location & activity thus making traffic analysis or network surveillances impossible by the intruders, hence TOR is widely used network for purpose such as personal freedom, secure communication & confidential business. Yet there are vulnerable flaws in the nodes & routing that can be utilized by intruders to de-anonymize the network & monitoring the whole network, such attacks can be avoided by conducting simple measures making TOR more secure & attack resistant because “Prevention is always better than cure”.

Authors and Affiliations

Vijaya Lakshmi. V

Keywords

Related Articles

Implementation of a new 32-bit Algorithm for Password Hashing 

The importance of hash algorithms for protecting the authenticity of information is exhibited. Application includes probity protection, traditional message authentication and digital signatures. As it is evident from rec...

Outdoor Dynamic Scene Video Object Segmentation Using SRM Algorithm

In video surveillance, image segmentation in outdoor scenes is a most important and complex task. A novel approach for video object segmentation in outdoor environment is described by using SRM (Statistical Region Mergin...

A Systematic approach of Software development implementation process-Part I 

This research paper most useful for all academics student of computer science. In this paper I have targeted all those student who works on their academic project. Since long time I found most of student not follow actua...

A SURVEY OF DESKTOP GRID SYSTEM SCHEDULING

Grid Computing forms virtual, collaborative organizations that share applications and data in an open heterogeneous server environment in order to work on common problems. Desktop Grid is a named collection of machines i...

Fusing Fingerprint and Iris Multimodal Biometrics using Soft Computing Techniques 

This paper presents the application of soft computing techniques in multimodal biometrics recognition. The paper investigates the comparative performance of three different approaches: nonoptimized neural network trained...

Download PDF file
  • EP ID EP135256
  • DOI -
  • Views 137
  • Downloads 0

How To Cite

Vijaya Lakshmi. V (2012). Security against attacks in TOR networks. International Journal of Computer Science & Engineering Technology, 3(1), 1-5. https://europub.co.uk/articles/-A-135256