首页    期刊浏览 2024年12月01日 星期日
登录注册

文章基本信息

  • 标题:Data Center Architecture Based Tor Network Using Against Attacker
  • 本地全文:下载
  • 作者:C.Mala ; T.Sathya Priya
  • 期刊名称:International Journal of Innovative Research in Computer and Communication Engineering
  • 印刷版ISSN:2320-9798
  • 电子版ISSN:2320-9801
  • 出版年度:2017
  • 卷号:5
  • 期号:11
  • 页码:16426
  • DOI:10.15680/IJIRCCE.2017.0511010
  • 出版社:S&S Publications
  • 摘要:Technological boom has led to the development of various networking devices and also the networkingspeed has increased tremendously by many folds. Now almost all the daily day to day activities can be done online, justname it and do it online like online banking ,shopping, ticket booking, E- Books , Online music , movies and many more.Now this is where TOR becomes more relevant, also known as “the Onion router”, it becomes very important to maintainthe anonymity of each user online. To stop various increasing attacks to the user online, to protect the personal details ofthe user while browsing net becomes very important and critical as these attack if successful will become a serious threatto the whole networking concept. Thus to keep the user details like name, address, current location secure, Tor provides avery efficient solution which involves encrypting an re-encrypting the users data multiple times, then sent throughsuccessive Tor relays, each one of which decrypts a "layer" of encryption before passing the data on to the next relay and,ultimately, its destination. This reduces the possibility of the user’s data from being unscrambled or understood in thenetworking process.
  • 关键词:Delay Tolerant Network; Security; Flood attack; Count Restricting Approach; Opportunistic Network;Environment Simulator
国家哲学社会科学文献中心版权所有