Research Paper | Information Security | India | Volume 11 Issue 1, January 2022
Anatomizing Relay Disintegration and Hop Operations of Tor
Abstract: The Tor Project is a prominent asset to privacy and security, metastasizing among commercials, and political leaders. The project has a designated browser, to route source requests to a generous consigned number of proxies, before reaching the header destination. Investigation: This paper is an in-depth observation made by setting up a Node Switch into the Tor Network, using a denominated Virtual Private Server (VPS), to capture, analyze, and compare Relay traffic to the Entry Node traffic to determine the entropy, encryption topology, and heuristics of the network. Method: This examination deduces the security, seclusion, and pliability of the network concerning the anonymity of browsing by using the methods of Static and Dynamic analysis. Principle Result: The Entry Node transmitted unencrypted domain names with IP addresses over the network, with the relay, encrypting the transmission suite for further propagation using TLSv1.2 encryption keys with a substantial amount of exchanges.
Keywords: Onion Network, Tor Browser, Tor Nodes, Online Privacy and Security, Anonymous Surfing
Edition: Volume 11 Issue 1, January 2022,
Pages: 371 - 376
How to Cite this Article?
Ujas Dhami, Nisarg Shah, "Anatomizing Relay Disintegration and Hop Operations of Tor", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SR22107180146, Volume 11 Issue 1, January 2022, 371 - 376, #ijsrnet
How to Share this Article?
Similar Articles with Keyword 'Network'
Effectuating Blockchain Network Compromise by Orchestrating a Daisy - Chain Architecture
Ideal Architecture for Security Operation Center Complementing Data Centers: An Overview
Ankit Srivastava  | Jatin Nagpal