Cell Counting Attack and Browser Attack against TOR Network

Download Now
Provided by: International Journal of Engineering Sciences & Research Technology (IJESRT)
Topic: Security
Format: PDF
The Onion Router (TOR) allows to hide the users identity various software under this categories are available that allows online anonymity network, supporting TCP applications over the Internet. It doesn't allow network surveillance or traffic analysis to get tracked but most of these software used equal size of cells (512B). In this paper, the authors are comparing cell-counting attacks and browser attacks against TOR. Different from cell-counting attacks, these attacks can confirm anonymous communication relationships quickly and accurately by manipulating one single cell and pose a serious threat against Tor.
Download Now

Find By Topic