M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 8, August 2016
An Improved Real Time Method for Detection, Blocking and Traceback of Malicious Traffic Over TOR
Rinaj Gafoor, Charlse M Varghese
Abstract: Tor is a prominent low-latency anonymous communication system. But it is currently abused in numerous ways. Attackers choose Tor because of its assurance of communication privacy. To gain an insight into such abuse, it is necessary to designed and implemented a novel system, for the discovery and the systematic study of malicious traffic over Tor. In this paper a novel real-time detection method based on fractal and information fusion is proposed. It focuses on the intrinsic macroscopic characteristics of network. It regards network traffic as the signal, and synthetically considers the macroscopic characteristics of network under different time scales with the fractal theory, including the self-similarity and the local singularity, which dont vary with the topology structures, the protocols and the attack types. To facilitate forensic traceback of malicious traffic, we implemented a dual-tone multi-frequency signaling-based approach to correlate botnet traffic at Tor entry routers and that at exit routers.
Keywords: Tor, Malicious Traffic, Traceback, Intrusion Detection System
Edition: Volume 5 Issue 8, August 2016,
Pages: 1860 - 1864
How to Cite this Article?
Rinaj Gafoor, Charlse M Varghese, "An Improved Real Time Method for Detection, Blocking and Traceback of Malicious Traffic Over TOR", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=ART20161349, Volume 5 Issue 8, August 2016, 1860 - 1864
How to Share this Article?
Similar Articles with Keyword 'Tor'
Multifunctional Remote Controlled Robot Using Android Application
T. A. Mithu, T. S. Reddy
Artificial Intelligence for Hiring
Ishan Borker, Ashok Veda
Similar Articles with Keyword 'Traceback'
Efficient Flow Marking IP Traceback System
Sonali H. Mane, S. Pratap Singh
A Survey on IP Traceback Mechanisms
Aparna C Bhadran, Maria Joy
Similar Articles with Keyword 'Intrusion Detection System'
Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar, Mohan K
A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN