Loading...
Search for: anonymity-networks
0.005 seconds

    A composite-metric based path selection technique for the Tor anonymity network

    , Article Journal of Systems and Software ; Volume 103 , 2015 , Pages 53-61 ; 01641212 (ISSN) Momeni Milajerdi, S ; Kharrazi, M ; Sharif University of Technology
    Abstract
    The Tor anonymous network has become quite popular with regular users on the Internet. In the Tor network, an anonymous path is created by selecting three relays through which the connection is redirected. Nevertheless, as the number of Tor users has increased substantially in recent years, the algorithm with which the relays are selected affects the performance provided by the Tor network. More importantly as the performance suffers, users will leave the network, resulting in a lower anonymity set and in turn lower security provided by Tor network. In this paper, we proposed an algorithm for improving performance and security of the Tor network, by employing a combination of different... 

    Attacking Tor; A Report on RAPTOR and Similar Attacking Tors

    , M.Sc. Thesis Sharif University of Technology Banka, Sadaf (Author) ; Peyvandi, Hossein (Supervisor)
    Abstract
    Coming to the generation of technology, where everything is possible through the Internet contributes a significant proportion to privacy protection. Several Privacy protection technologies have been launched to maintain the confidentiality of user information. Tor, also known as an Onion Router, is indeed the largest global anonymized network technology, including over 7000 distinct domain controller endpoints located all over the globe. Various kinds of wrongdoings are increasing day by day such as terrorism, abuse of the child is increasing using the network. To stop this monitoring plan is needed to develop. To enable this all the hacking mechanisms along with the architecture were... 

    Enhancing the Confidentiality of Encrypted Traffic with the Adversarial-Learning Approach

    , M.Sc. Thesis Sharif University of Technology Tajalli, Hamid Reza (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    The importance of confidentiality and anonymity maintaining mechanisms are not hidden to anybody these days. With the worldwide web spreading rapidly, protecting the users' data flowing through it has become one of the most critical challenges to anonymity mechanisms. Nonetheless, machine learning algorithms have shown that they can reveal some explanatory information, even from encrypted traffic. Website fingerprinting attacks are a group of traffic analysis attacks that aim to detect the website which the monitored user has already visited. The current research takes a brief survey over website fingerprinting attacks presented in recent studies plus the defenses which took devised against... 

    Mid-defense: Mitigating protocol-level attacks in TOR using indistinguishability obfuscation

    , Article 2014 11th International ISC Conference on Information Security and Cryptology, ISCISC 2014 ; 3- 4 September , 2014 , pp. 214-219 ; ISBN: 9781479953837 Soltani, M ; Najafi, S ; Jalili, R ; Sharif University of Technology
    Abstract
    TOR is one of the most famous anonymity networks. TOR works correctly when at least one honest relay exists along an established circuit. However, many attacks reveal anonymity of TOR communications by watermarking traffics, changing timings, counting cells per packets, and recently, introducing errors in cells. This paper focuses on protocol-level attacks which can de-anonymize users by changing a cell, and provides a solution for this attack by changing the way integrities of cells are checked. The proposed design allows all relays, not just the exit node, to check the integrity of cells, independently. In addition, this paper proposes a novel method, based on the concept of...