Security to Anonymous Network
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2014, Vol 1, Issue 1
Abstract
In the today’s world there is mainly people are concentrate on the security and privacy of the data. As there is some change in security system behavior it not as per user intension. In the network some people make unintentional expose of personal information, or relationships and other things in front of people.Technology gives us solution for these types of exposures that is encryption and decryption for data i.e. change view and appearance of data for other or unknown persons. In networking there are mainly two types of attacks Passive and Active attack.Passive i.e. only monitoring the system network and datawhich is send. But the active attack is focus about the only change in data send by client.Attackers interested in the changing of data and to get detail about the communicationhappen in the sender and receiver. In TOR, attack happen at the exit onion router.While searching basically this attack is based on active attacks. But main problem inthis type is degrading attacks and hidden services. In this attack attacker select particular IP packet at exit onion router and changes that packet. So our aim is to detectattacker and degrade anonymous services.
Authors and Affiliations
Prof. Devendra Shamkuwar
Recognition of Mind in Global Systems --- A Higher Study
Let us recall for a moment, “Change is the Law of Life”! Credit goes to one of the late Presidents of India, His Excellency, Dr. S.Radhakrishnan for having said that This is globally applicable to all forms of Life inclu...
Web Page Categorization Based on Neurons
Contemporary web is comprised of trillions of pages and everyday tremendous amount of requests are made to put more web pages on the WWW. It has been difficult to manage information present on web than to create it. Web...
Simulation of Vedic Om: Monte Carlo Method in Operations Research
A sound is vibrating in the whole of Creation! It is diverting our mind from study of Matter, its limitations and advantages like pharmaceutical properties, for example , forcing us to believe that only by-products are W...
Automatic College Bell Using Raspberry-Pi
The world over the decades has made considerable advancement in automation, au-tomation is employed in every sector whether it is home or industry. Here a new and inexpensive design is being presented. This design a trem...
Voice Call Using Arduino and GSM Module
In this article we demonstrate one of the possible ways to make a voice call using Arduino tools and GSM module. A Numeric keypad is built through which the contact number is dialed which is recognized by the Arduino boa...