PREVENTION AGAINST NEW CELL COUNTING ATTACK AGAINST TOR NETWORK

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Novel Approach To Cell-Counting-Based Attack Against Tor

Different low-latency unidentified communication systems such as Tor and Anonymizer have been deliberate to make available anonymity service for users. In order to hide from view the communication of users, most of the secrecy systems pack the application data into equal-sized cells. Through extensive experiments on Tor, we originate that the size of IP packets in the Tor network can be very ac...

متن کامل

A Stealthy Attack Against Tor Guard Selection

Tor is a popular low-latency anonymous communication system which could provide anonymity and anti-censorship. Based on previous researches on de-anonymization of Tor, this paper proposes a novel approach to attack users’ guard selection which can pose great threat against Tor users' anonymity. Under the current design of Tor, once entry guards are compromised, the probability that an attacker ...

متن کامل

A potential HTTP-based application-level attack against Tor

Tor has become one of the most popular overlay networks for anonymizing TCP traffic, however, the anonymity of Tor clients is threatened by various attacks exploiting traffic analysis or Tor’s design features. Although considerable effort has beenmade to secure and improve Tor networks, little attention has been paid to various application-level attacks against Tor. In this paper, we present a ...

متن کامل

A First-Hop Traffic Analysis Attack Against Tor

We introduce an attack against encrypted web traffic passing over the first hop – between client and Tor gateway – of the Tor network. The attack makes use only of packet timing information on the uplink and so is impervious to packet padding defences. In addition, we show that the attack is robust against the randomised routing used in Tor. We demonstrate the effectiveness of the attack at ide...

متن کامل

A New Attack against Khazad

Khazad is a new block cipher initially proposed as a candidate to the NESSIE project. Its design is very similar to Rijndael, although it is a 64-bit block cipher. In this paper, we propose a new attack that can be seen as an extension of the Square attack. It takes advantage of redundancies between the round key derivation and the round function, and also exploits some algebraic observations o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Research in Engineering and Technology

سال: 2013

ISSN: 2321-7308,2319-1163

DOI: 10.15623/ijret.2013.0206012