We present new traffic-analysis techniques that allow adversaries with only a partial view of the network to infer which nodes are being used to relay the anonymous streams and therefore greatly reduce the anonymity provided by Tor. Its low latency makes it very suitable for common tasks, such as Web browsing, but insecure against traffic-analysis attacks by a global passive adversary. Tor is the second generation onion router supporting the anonymous transport of TCP streams over the Internet. The TOR Detector is very useful in corporate networks to determine whether users are following the enforced company Acceptable Use Policy (AUP). Several tests on both TOR browsing and normal Internet browsing are being done to check the efficiency and accuracy of the system. Maintain a level of accuracy with its IP list. The system updates its list of known exit nodes periodically to The system places a block in Access Control List (ACL) in the firewall to prevent inbound and outbound illegal TOR connection. A detected suspicious traffic is automatically reported, logged and for some instances, mitigated. The behavioral aspect is determined based on how majority of the TOR packets look like. The known exit nodes are being chosen based on IP reputation. The TOR Detector checks for potential TOR traffic based on customized and automated Intrusion Detection System (IDS) signatures based on known exit nodes and behavior. Unscrupulous individuals may use TOR to deface and harm target web services without getting tracked down by authorities. However, TOR-based solutions pose a threat to computer users. The Onion Router (TOR) is an open-source software program that allows users to protect their privacy and security against internet surveillance and provides online anonymity to protect personal privacy of network users (Techopedia, 2010-2013).
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |