Security to Anonymous Network
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2014, Vol 1, Issue 1
Abstract
In the today’s world there is mainly people are concentrate on the security and privacy of the data. As there is some change in security system behavior it not as per user intension. In the network some people make unintentional expose of personal information, or relationships and other things in front of people.Technology gives us solution for these types of exposures that is encryption and decryption for data i.e. change view and appearance of data for other or unknown persons. In networking there are mainly two types of attacks Passive and Active attack.Passive i.e. only monitoring the system network and datawhich is send. But the active attack is focus about the only change in data send by client.Attackers interested in the changing of data and to get detail about the communicationhappen in the sender and receiver. In TOR, attack happen at the exit onion router.While searching basically this attack is based on active attacks. But main problem inthis type is degrading attacks and hidden services. In this attack attacker select particular IP packet at exit onion router and changes that packet. So our aim is to detectattacker and degrade anonymous services.
Authors and Affiliations
Prof. Devendra Shamkuwar
Brain Controlled Robotic Vehicle
Independent mobility is core to being able to perform activities of daily living by oneself. A large number of people who are not comfortable with conventional interfaces, due to various machine dysfunctions, like wiring...
Electro Chemical Comparative Studies Of Ortho, Meta and Para Nitro Phenols
Nitro phenol exists in three isomeric forms namely ortho, meta and para nitro phenols. Their susceptibility for electrochemical oxidation was studies by cyclic voltammetric method and polarization studies. Plenty of chem...
A Novel 2D ASCO-OFDM Scheme In Wireless Communication
The asymmetrically and symmetrically clipping optical OFDM (ASCO-OFDM) in two dimensional (2D) intensity modulation direct detection (IM/DD) is a novel technique in optical wireless communication (OWC). In 2D ASCO-OFDM t...
Design of Low-Power Acoustic Modem for Underwater Communication
ere is a growing interest in the usage of underwater networked structures for oceanographic applications. These networks frequently depend upon acoustic communication, which poses some of demanding situations for reliabl...
Tall Office Building Form to Attend Sustainability
From the early history, we can visualize that there is continuous development in urban areas. Development not only city settlements but rather in individual buildings along with innovative technologies from pyramids of E...