首页    期刊浏览 2024年12月01日 星期日
登录注册

文章基本信息

  • 标题:A Novel Cell Reckoning Intrusion against TOR
  • 本地全文:下载
  • 作者:Ujjaneni Siva Lalitha ; Prof.S.V.Achutha Rao
  • 期刊名称:International Journal of Computer Trends and Technology
  • 电子版ISSN:2231-2803
  • 出版年度:2013
  • 卷号:4
  • 期号:7-4
  • 出版社:Seventh Sense Research Group
  • 摘要:TOR (The onion router) is a low latency anonymous communication system for enabling online anonymity. TOR directs Internet traffic through a free, worldwide volunteer network consisting of more than three thousand relays to conceal a user's location or usage from anyone conducting network surveillance or traffic analysis. Tor aims to conceal its users' identities and their network activity from surveillance and traffic analysis by separating identification and routing. It is an implementation of onion routing, which encrypts and then randomly bounces communications through a network of relays run by volunteers around the globe. Because the internet address of the sender and the recipient are not both in clear text at any hop along the way, anyone eavesdropping at any point along the communication channel cannot directly identify both ends. Furthermore, to the recipient it appears that the last Tor node (the exit node) is the originator of the communication rather than the sender. Because of this TOR communication system, if an intruder is going to make any unauthenticated changes to system then it is not possible to track him back. In this paper we proposed a solution for this problem by using ‘CellReckoningIntrusion –Against TOR’. By the no of experiment on TOR we found that the size of IP packets in the Tor network can be very dynamic because a cell is an application concept and the IP layer may repack cells. In this attack, the attacker can embed a secret signal into the variation of cell counter of the target traffic. The embedded signal will be carried along with the target traffic and arrive at the malicious entry onion router. Then, an accomplice of the attacker at the malicious entry onion router will detect the embedded signal based on the received cells and confirm the communication relationship among users. We have implemented this intrusion against Tor, and our experimental data validate is highly effective and efficient.
  • 关键词:Anonymous; reckoning; mix networks; intrusion; signal; Tor
国家哲学社会科学文献中心版权所有