Security against attacks in TOR networks

Abstract

TOR( The Onion Router) network is a system that provide anonymity for its client by routing the client packets via various volunteering networks, such routing conceals the clients location & activity thus making traffic analysis or network surveillances impossible by the intruders, hence TOR is widely used network for purpose such as personal freedom, secure communication & confidential business. Yet there are vulnerable flaws in the nodes & routing that can be utilized by intruders to de-anonymize the network & monitoring the whole network, such attacks can be avoided by conducting simple measures making TOR more secure & attack resistant because “Prevention is always better than cure”.

Authors and Affiliations

Vijaya Lakshmi. V

Keywords

Related Articles

Enhancing the security and routing reliability for achieving efficient data transmission in mobile Ad Hoc Networks 

A Mobile Ad hoc Network is a wireless network in which a central management scheme is not available; this causes nodes to dynamically self-organize each one playing both router and node’s roles. Compared to the other typ...

A Secure and Privacy Preserving Technique in Distributed Information Sharing using AES Encryption and Genetic Algorithm

In many organizations distributed information sharing is used to share data in a large network. In distributed Information sharing there are many chances to hack the technical and personal information of client and serve...

A REVIEW PAPER ON SMS TEXT TO PLAIN ENGLISH TRANSLATION(Text Normalization)

Mobile technology as well as social networking technology plays an important role in communication across internet. A large amount of information is found in noisy contexts as texting and chat lingo have become increasin...

Multimodal Biometrics An Effective Approach of Person Identification : A Review 

In new era, the biometric systems high security applications must match with perfect requirement of real world. This paper gives an overview of multimodal biometrics as well as different fusion of multiple biometrics whi...

A Novel Technique for Image Compression in Hand Written Recognition using Back Propagation in Neural Network

The handwritten symbol recognition plays an important role in present communication systems. In the data communication systems, all the data have to be recorded, encoded and will be communicated with other systems. Prese...

Download PDF file
  • EP ID EP135256
  • DOI -
  • Views 134
  • Downloads 0

How To Cite

Vijaya Lakshmi. V (2012). Security against attacks in TOR networks. International Journal of Computer Science & Engineering Technology, 3(1), 1-5. https://europub.co.uk/articles/-A-135256