Analysis of Cell-Counting Based Attack Against Tor

Provided by: International Journal of Emerging Technology and Advanced Engineering (IJETAE)
Topic: Mobility
Format: PDF
The Onion Router (TOR) allows to hide the users identity various software under this categories are available that allows online anonymity. It doesn't allow network surveillance or traffic analysis to get tracked but most of these software used equal size cells (512B). In this paper, the authors are analyzing counting attacks against TOR which allows one to identify anonymous communication among user. Firstly, they need to buy one onion router then attacker can include special signal i.e., cell counting into network traffic. They have developed this system against TOR and experimental result shows the effectiveness of algorithms and allows detecting TOR networks.

Find By Topic