Loading...

Attacking Tor; A Report on RAPTOR and Similar Attacking Tors

Banka, Sadaf | 2022

142 Viewed
  1. Type of Document: M.Sc. Thesis
  2. Language: English
  3. Document No: 55144 (52)
  4. University: Sharif University of Technolog, International Campus, Kish Island
  5. Department: Science and Engineering
  6. Advisor(s): Peyvandi, Hossein
  7. Abstract:
  8. Coming to the generation of technology, where everything is possible through the Internet contributes a significant proportion to privacy protection. Several Privacy protection technologies have been launched to maintain the confidentiality of user information. Tor, also known as an Onion Router, is indeed the largest global anonymized network technology, including over 7000 distinct domain controller endpoints located all over the globe. Various kinds of wrongdoings are increasing day by day such as terrorism, abuse of the child is increasing using the network. To stop this monitoring plan is needed to develop. To enable this all the hacking mechanisms along with the architecture were explained in the thesis. Our research and simulation results depict that with the combination of the attacks explained in the thesis along with the understanding of the dark web architecture, the hacking of Tor, although a tough procedure can be accomplished with the loopholes around the whole paradigm
  9. Keywords:
  10. Privacy ; Privacy Preserving ; Global Anonymized Network ; Onion Router ; Dark Web ; Routing Attacks

 Digital Object List

 Bookmark

No TOC