Research on tor-based anonymous DDoS attack

نویسندگان

چکیده

Based on Tor, an anonymous DDoS attack is proposed, and the attacker of this very difficult to trace due strong anonymity Tor. Through conducting experiments in different network environment making analyzation security, results demonstrate effectiveness attack, strategy defense also discussed.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Survey on DDoS Attack in Cloud Environment

Cloud computing has become popular and a huge platform for computing where large number of data are available online. Nature of cloud computing is distributed, due to this kind of nature they have become easy target for attackers to exploits the security vulnerability. Availability of data is most important part of cloud computing and even for economic growth of the society. Attack name Denial ...

متن کامل

On DDoS Attack Related Minimum Cut Problems

In this paper, we study two important extensions of the classical minimum cut problem, called Connectivity Preserving Minimum Cut (CPMC) problem and Threshold Minimum Cut (TMC) problem, which have important applications in largescale DDoS attacks. In CPMC problem, a minimum cut is sought to separate a of source from a destination node and meanwhile preserve the connectivity between the source a...

متن کامل

Analysis of Entropy Based DDoS Attack Detection to Detect UDP Based DDoS Attacks in IPv6 Networks

Distributed Denial of Service (DDoS) attacks is an important thread in internet. In IPv6 internet worms are difficult to identify, because of the total amount of traffic which does not allow the instant investigation of fine points. In Internet Protocol Version 6 (IPv6) networks one of the common traffic flows occurs is UDP data flows. It is an unreliable data flow. This characteristic can be u...

متن کامل

A STor: Social Network based Anonymous Communication in Tor

Anonymity networks hide user identities with the help of relayed anonymity routers. However, the state-of-the-art anonymity networks do not provide an effective trust model. As a result, users cannot circumvent malicious or vulnerable routers, thus making them susceptible to malicious router based attacks (e.g., correlation attacks). In this paper, we propose a novel social network based trust ...

متن کامل

STor: Social Network based Anonymous Communication in Tor

Anonymity networks hide user identities with the help of relayed anonymity routers. However, the state-of-the-art anonymitynetworks do not provide an effective trust model. As a result, users cannot circumvent malicious or vulnerable routers, thus makingthem susceptible to malicious router based attacks (e.g., correlation attacks). In this paper, we propose a novel social network based<...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: MATEC web of conferences

سال: 2021

ISSN: ['2261-236X', '2274-7214']

DOI: https://doi.org/10.1051/matecconf/202133608007