International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 3

Research Paper | Information Security | India | Volume 11 Issue 1, January 2022


Anatomizing Relay Disintegration and Hop Operations of Tor

Ujas Dhami [4] | Nisarg Shah [4]


Abstract: The Tor Project is a prominent asset to privacy and security, metastasizing among commercials, and political leaders. The project has a designated browser, to route source requests to a generous consigned number of proxies, before reaching the header destination. Investigation: This paper is an in-depth observation made by setting up a Node Switch into the Tor Network, using a denominated Virtual Private Server (VPS), to capture, analyze, and compare Relay traffic to the Entry Node traffic to determine the entropy, encryption topology, and heuristics of the network. Method: This examination deduces the security, seclusion, and pliability of the network concerning the anonymity of browsing by using the methods of Static and Dynamic analysis. Principle Result: The Entry Node transmitted unencrypted domain names with IP addresses over the network, with the relay, encrypting the transmission suite for further propagation using TLSv1.2 encryption keys with a substantial amount of exchanges.


Keywords: Onion Network, Tor Browser, Tor Nodes, Online Privacy and Security, Anonymous Surfing


Edition: Volume 11 Issue 1, January 2022,


Pages: 371 - 376

Anatomizing Relay Disintegration and Hop Operations of Tor


How to Cite this Article?

Ujas Dhami, Nisarg Shah, "Anatomizing Relay Disintegration and Hop Operations of Tor", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SR22107180146, Volume 11 Issue 1, January 2022, 371 - 376, #ijsrnet

How to Share this Article?

Enter Your Email Address




Similar Articles with Keyword 'Network'

Downloads: 0

Research Paper, Information Security, India, Volume 11 Issue 6, June 2022

Pages: 1655 - 1659

Effectuating Blockchain Network Compromise by Orchestrating a Daisy - Chain Architecture

Ujas Dhami [4] | Nisarg Shah [4]

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Information Security, India, Volume 10 Issue 12, December 2021

Pages: 77 - 79

Ideal Architecture for Security Operation Center Complementing Data Centers: An Overview

Ankit Srivastava [3] | Jatin Nagpal

Share this Article


Top