Downloads: 113 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 8, August 2016
An Improved Real Time Method for Detection, Blocking and Traceback of Malicious Traffic Over TOR
Rinaj Gafoor | Charlse M Varghese [2]
Abstract: Tor is a prominent low-latency anonymous communication system. But it is currently abused in numerous ways. Attackers choose Tor because of its assurance of communication privacy. To gain an insight into such abuse, it is necessary to designed and implemented a novel system, for the discovery and the systematic study of malicious traffic over Tor. In this paper a novel real-time detection method based on fractal and information fusion is proposed. It focuses on the intrinsic macroscopic characteristics of network. It regards network traffic as the signal, and synthetically considers the macroscopic characteristics of network under different time scales with the fractal theory, including the self-similarity and the local singularity, which dont vary with the topology structures, the protocols and the attack types. To facilitate forensic traceback of malicious traffic, we implemented a dual-tone multi-frequency signaling-based approach to correlate botnet traffic at Tor entry routers and that at exit routers.
Keywords: Tor, Malicious Traffic, Traceback, Intrusion Detection System
Edition: Volume 5 Issue 8, August 2016,
Pages: 1860 - 1864
Similar Articles with Keyword 'Tor'
Downloads: 186 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016
Pages: 1523 - 1527Multifunctional Remote Controlled Robot Using Android Application
T. A. Mithu | T. S. Reddy
Downloads: 179 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020
Pages: 457 - 461Artificial Intelligence for Hiring
Ishan Borker | Ashok Veda [2]