Improving Security in Anonymizing Networks Using a Privacy Enhancing System

Users are allowed to access the anonymity network while they are blocked from tracing their identity on the internet. Tor is open-source anonymity software free to public use. Online anonymity moves Internet traffic through a network of servers. Traffic analysis and network surveillance are prevented by the networks which are anonymized or at least makes it more difficult. Website administrators can disable access to abuser by blocking their IP addresses. But when an abuser routes through an anonymizing network it is not practical to block the IP address.

Provided by: International Journal of Soft Computing and Engineering (IJSCE) Topic: Security Date Added: Jan 2012 Format: PDF

Download Now

Find By Topic