Security against attacks in TOR networks
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2012, Vol 3, Issue 1
Abstract
TOR( The Onion Router) network is a system that provide anonymity for its client by routing the client packets via various volunteering networks, such routing conceals the clients location & activity thus making traffic analysis or network surveillances impossible by the intruders, hence TOR is widely used network for purpose such as personal freedom, secure communication & confidential business. Yet there are vulnerable flaws in the nodes & routing that can be utilized by intruders to de-anonymize the network & monitoring the whole network, such attacks can be avoided by conducting simple measures making TOR more secure & attack resistant because “Prevention is always better than cure”.
Authors and Affiliations
Vijaya Lakshmi. V
Secondary Structure Prediction Using ANN Learning
This paper presents two methods for predicting the secondary structure of proteins based on artificial neural network learning. Two variations of NN learning rule are employed using feedforward backpropogation architectu...
A Symmetric FHE Scheme Based on Linear Algebra
FHE is considered to be Holy Grail of cloud computing. Many applications of cloud computing inherently need symmetric keys while very few FHE schemes have been proposed with symmetric keys. Even with the schemes based on...
Cosine Similarity Function For The Temporal Dynamic Web Data
Cosine similarity function is one of the most popular similarity function for handling the web data in various applications such as recommender system, collaborative filtering algorithms, classification algorithms, etc....
Efficient Color Tracking from Images and Real time Video
Recent trends in technology aim to build highly interactive and easy to use applications using non conventional interaction devices such as Web Cam, Projector, Data Gloves etc. Among them Web Cam can be used for developm...
A Novel Approach to Recognize the off-line Handwritten Numerals using MLP and SVM Classifiers
This paper presents a new approach to off-line handwritten numeral recognition. Recognition of handwritten numerals has been one of the most challenging task in pattern recognition. Recognition of handwritten numerals po...