Security to Anonymous Network
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2014, Vol 1, Issue 1
Abstract
In the today’s world there is mainly people are concentrate on the security and privacy of the data. As there is some change in security system behavior it not as per user intension. In the network some people make unintentional expose of personal information, or relationships and other things in front of people.Technology gives us solution for these types of exposures that is encryption and decryption for data i.e. change view and appearance of data for other or unknown persons. In networking there are mainly two types of attacks Passive and Active attack.Passive i.e. only monitoring the system network and datawhich is send. But the active attack is focus about the only change in data send by client.Attackers interested in the changing of data and to get detail about the communicationhappen in the sender and receiver. In TOR, attack happen at the exit onion router.While searching basically this attack is based on active attacks. But main problem inthis type is degrading attacks and hidden services. In this attack attacker select particular IP packet at exit onion router and changes that packet. So our aim is to detectattacker and degrade anonymous services.
Authors and Affiliations
Prof. Devendra Shamkuwar
Agriculture at a Click Using PLC & SCADA
The project emphasizes on automation of agriculture and to make farming easy using advanced technologies. Our project focuses on four main aspects of modern farming. Firstly, drip irrigation optimizes the use of water in...
Comparative Study of VOC Sensors Based on Ruthenated MWCNT/SnO2 Nanocomposites
Thick-film VOCs sensors based on ruthenated multi-walled carbon nanotubes coated with tin-dioxide nanoparticles nanocomposite structures (MWCNTs/SnO2) are prepared using three methods: hydrothermal synthesis, sol–gel tec...
A Review on Enabling Synonym Based Fined-grained Multi-keyword Search Using Hierarchical Clustering
Cloud is huge platform that provides various services its users such as, storage, management, maintain, searching, sorting of data etc. With this advantages data owner outsourced their data in cloud. Before outsourcing o...
Design and Development of Hyper Spectral Image Classification Using Enhanced Mean Shift Segmentation in Image Mining
Hyper spectral imaging is becoming an important analytical tool for generating land-use map. High dimensionality in hyper spectral remote sensing data can guaranty in principle a detailed discrimination of the observed s...
Wrapper Approach for IDS Using Fuzzy Genetic Algorithm
The intrusion detection systems (IDS) are becoming indispensable for effective protection against attacks that are constantly changing in magnitude and complexity. This paper proposes a fuzzy genetic algorithm (FGA) for...