Downloads: 3 | Views: 203
Research Paper | Information Security | India | Volume 11 Issue 1, January 2022 | Popularity: 4.9 / 10
Anatomizing Relay Disintegration and Hop Operations of Tor
Ujas Dhami, Nisarg Shah
Abstract: The Tor Project is a prominent asset to privacy and security, metastasizing among commercials, and political leaders. The project has a designated browser, to route source requests to a generous consigned number of proxies, before reaching the header destination. Investigation: This paper is an in-depth observation made by setting up a Node Switch into the Tor Network, using a denominated Virtual Private Server (VPS), to capture, analyze, and compare Relay traffic to the Entry Node traffic to determine the entropy, encryption topology, and heuristics of the network. Method: This examination deduces the security, seclusion, and pliability of the network concerning the anonymity of browsing by using the methods of Static and Dynamic analysis. Principle Result: The Entry Node transmitted unencrypted domain names with IP addresses over the network, with the relay, encrypting the transmission suite for further propagation using TLSv1.2 encryption keys with a substantial amount of exchanges.
Keywords: Onion Network, Tor Browser, Tor Nodes, Online Privacy and Security, Anonymous Surfing
Edition: Volume 11 Issue 1, January 2022
Pages: 371 - 376
DOI: https://www.doi.org/10.21275/SR22107180146
Make Sure to Disable the Pop-Up Blocker of Web Browser