Security to Anonymous Network

Abstract

In the today’s world there is mainly people are concentrate on the security and privacy of the data. As there is some change in security system behavior it not as per user intension. In the network some people make unintentional expose of personal information, or relationships and other things in front of people.Technology gives us solution for these types of exposures that is encryption and decryption for data i.e. change view and appearance of data for other or unknown persons. In networking there are mainly two types of attacks Passive and Active attack.Passive i.e. only monitoring the system network and datawhich is send. But the active attack is focus about the only change in data send by client.Attackers interested in the changing of data and to get detail about the communicationhappen in the sender and receiver. In TOR, attack happen at the exit onion router.While searching basically this attack is based on active attacks. But main problem inthis type is degrading attacks and hidden services. In this attack attacker select particular IP packet at exit onion router and changes that packet. So our aim is to detectattacker and degrade anonymous services.

Authors and Affiliations

Prof. Devendra Shamkuwar

Keywords

Related Articles

Agriculture at a Click Using PLC & SCADA

The project emphasizes on automation of agriculture and to make farming easy using advanced technologies. Our project focuses on four main aspects of modern farming. Firstly, drip irrigation optimizes the use of water in...

Comparative Study of VOC Sensors Based on Ruthenated MWCNT/SnO2 Nanocomposites

Thick-film VOCs sensors based on ruthenated multi-walled carbon nanotubes coated with tin-dioxide nanoparticles nanocomposite structures (MWCNTs/SnO2) are prepared using three methods: hydrothermal synthesis, sol–gel tec...

A Review on Enabling Synonym Based Fined-grained Multi-keyword Search Using Hierarchical Clustering

Cloud is huge platform that provides various services its users such as, storage, management, maintain, searching, sorting of data etc. With this advantages data owner outsourced their data in cloud. Before outsourcing o...

Design and Development of Hyper Spectral Image Classification Using Enhanced Mean Shift Segmentation in Image Mining

Hyper spectral imaging is becoming an important analytical tool for generating land-use map. High dimensionality in hyper spectral remote sensing data can guaranty in principle a detailed discrimination of the observed s...

Wrapper Approach for IDS Using Fuzzy Genetic Algorithm

The intrusion detection systems (IDS) are becoming indispensable for effective protection against attacks that are constantly changing in magnitude and complexity. This paper proposes a fuzzy genetic algorithm (FGA) for...

Download PDF file
  • EP ID EP220182
  • DOI -
  • Views 163
  • Downloads 0

How To Cite

Prof. Devendra Shamkuwar (2014). Security to Anonymous Network. International journal of Emerging Trends in Science and Technology, 1(1), 57-61. https://europub.co.uk./articles/-A-220182