Downloads: 3
India | Information Security | Volume 11 Issue 1, January 2022 | Pages: 371 - 376
Anatomizing Relay Disintegration and Hop Operations of Tor
Abstract: The Tor Project is a prominent asset to privacy and security, metastasizing among commercials, and political leaders. The project has a designated browser, to route source requests to a generous consigned number of proxies, before reaching the header destination. Investigation: This paper is an in-depth observation made by setting up a Node Switch into the Tor Network, using a denominated Virtual Private Server (VPS), to capture, analyze, and compare Relay traffic to the Entry Node traffic to determine the entropy, encryption topology, and heuristics of the network. Method: This examination deduces the security, seclusion, and pliability of the network concerning the anonymity of browsing by using the methods of Static and Dynamic analysis. Principle Result: The Entry Node transmitted unencrypted domain names with IP addresses over the network, with the relay, encrypting the transmission suite for further propagation using TLSv1.2 encryption keys with a substantial amount of exchanges.
Keywords: Onion Network, Tor Browser, Tor Nodes, Online Privacy and Security, Anonymous Surfing
Received Comments
No approved comments available.