ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Anatomizing Relay Disintegration and Hop Operations of Tor

Journal: International Journal of Science and Research (IJSR) (Vol.11, No. 1)

Publication Date:

Authors : ; ;

Page : 371-376

Keywords : Onion Network; Tor Browser; Tor Nodes; Online Privacy and Security; Anonymous Surfing;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The Tor Project is a prominent asset to privacy and security, metastasizing among commercials, and political leaders. The project has a designated browser, to route source requests to a generous consigned number of proxies, before reaching the header destination. Investigation: This paper is an in-depth observation made by setting up a Node Switch into the Tor Network, using a denominated Virtual Private Server (VPS), to capture, analyze, and compare Relay traffic to the Entry Node traffic to determine the entropy, encryption topology, and heuristics of the network. Method: This examination deduces the security, seclusion, and pliability of the network concerning the anonymity of browsing by using the methods of Static and Dynamic analysis. Principle Result: The Entry Node transmitted unencrypted domain names with IP addresses over the network, with the relay, encrypting the transmission suite for further propagation using TLSv1.2 encryption keys with a substantial amount of exchanges.

Last modified: 2022-02-15 19:04:11