SlideShare a Scribd company logo
1 of 4
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 391
MODELING AND PREVENTION OF CELL COUNTING BASED
ATTACKS ON TOR
Mamatha.Ch1
, Manoj Kumar.G2
1
Student, 2
Asst.Professor, Department of CSE, MRCET, Andhra Pradesh, India
mamathachakilela@gmail.com, manojvarma9@gmail.com
Abstract
Many anonymous networks came into existence. For instance Tor allows its users to gain access to services anonymously. This
network causes most of the attacks as the adversaries can hide their identity and make attacks successfully from a remote place. By
making a new attack on Tor can find the vulnerability of the Tor. Ling et al. presented a new cell counting mechanism for making an
attack on Tor. In this paper we implemented a custom simulator that models a Tor and demonstrates the cell counting attack by
simulating nodes like sender, receiver, onion router and attacker. The experimental results revealed that the proposed attack
mechanism is effective.
Keywords: Anonymous network, Tor, attacker model, cell counting
---------------------------------------------------------------------***-------------------------------------------------------------------------
1. INTRODUCTION
Privacy and integrity have received great attention in all kinds
of networks. With popularity of Internet various kinds of
networks came into existence. One such network is known as
Tor. This is an anonymous network where the users of the
network can gain access to services of network without
disclosing or proving identity. However, this kind of network
is vulnerable to security attacks. The attacks are made by
adversaries from a remote place through intermediary nodes.
In anonymous networks encryption along can’t make the
network secure [1],[2]. Researchers worked on various models
to protect such networks from malicious networks. Many
anonymous applications were investigated in [3]. The
anonymous applications can also be sued for file sharing and
also web browsing [4], [5]. The remainder of this paper is
structured as follows. Section 2 reviews literature. Section 3
provides information about the proposed model. Section 4
presents experimental results while section 5 concludes the
paper.
2. RELATED WORK
Networks of all kinds are vulnerable unless certain security
measures are considered. A good security review of network
systems is found in [4], [3]. With respect to asynchronous
communication much research went on earlier on mix
networks. Traffic analysis techniques are used to detect and
prevent attacks in mix systems. The existing techniques are
categorized into two types namely active watermarking
techniques and passive traffic analysis. Passive traffic analysis
is used to find attacks where attackers record traffic and then
reuse it as explored in [6] and [7]. By analyzing patterns of
encrypted content also, the attackers are able to extract
sensitive information as the recent study explores [8], [9],
[10], and [11]. HTTP traffic with packets is explored in [10]
for identifying web pages satisfactorily. The distribution of
packet sizes in encrypted VoIP content is investigated in [9].
Spoken phases can be intercepted by eavesdropper or
adversary when it is of VoIP kind as explored in [12].
Active watermarking on the other hand embeds signals into
traffic as discussed widely in [13], [14], [15], and [16]. These
techniques also are capable of reducing false positives by
using passive traffic analysis. Flow-watermarking scheme was
proposed by Yu et al. [15] to identify secret communication in
mix networks. In [2] compromised mix router is studied using
a security scheme. In [13] timing – based attacks pertaining to
watermarking and the trace back. The feasibility of timing
based attacks is also explored by Wang et al. [14]. The secrecy
of timing – based attacks and the watermarking for making
trace back are explored in [13] and [17]. In [18] a multi-flow
approach is proposed to watermark that is interval – based
[19], [20]. Other kind of water marks known as DSSS-based
watermarks are explored in [15]. For observing long silence
periods multi-flow-based watermarking is used.
3. PROTOTYPE IMPLEMENTATION
We have implemented a custom simulator which models a
sender, receiver, router, and attacker. Our aim is to
demonstrate a cell counting attack in the anonymous network.
The application is built in a PC with 4 GB RAM, Core 2 Dual
processor running Windows XP OS. The representations of
sender node, receiver node, and router and attacker node are
presented here. Fig.2 shows the UI of sender node.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 392
Fig. 1– Typical sender node
As can be seen in fig. 2, the GUI shows the typical sender
node behavior. The sender node sends data to a receiver which
is sent through various router nodes. The router node forwards
the data to destination node through one or more intermediate
routers. The router node is as shown in fig. 3.
Fig. 2 – A typical router node
As can be seen in fig. 2, the router node shows the status of
incoming and outgoing packets. It also shows any packets
which are subjected to attacks. The router can forward data it
receives to either other router or destination.
Fig.3 – A typical receiver node
As can be seen in fig. 3, the user interface of the receiver node
is shown. This program simulates the receiver’s behavior in
the network.
Fig.4 – A typical attacker node
As can be seen in fig. 4, the user interface of typical attacker is
simulated. The attacker node is used to demonstrate to make a
cell counting attack on the network.
4. EXPERIMENTAL RESULTS
Various experiments are made in the simulated network in
terms of packet size, number of malicious routers, delay
probability, maximal likelihood and so on. The experimental
results are presented here. Fig. 1 shows the number of packets
and packet size.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 393
Fig. 5- Number of packets versus packet size
As shown in fig 5 the horizontal axis represents packet size
while the vertical axis represents number of packets.
Fig6. Probability that a circuit chooses the malicious routers
as entry and exit routers versus number of malicious Tor
routers
As shown in fig.6 the horizontal axis is represented as number
of malicious tor routers while the vertical axis represented as
catch probability
Fig7.One-way trip time probability density function
As shown in fig.7. The horizontal axis is represented as one
way trip time while the vertical axis represented as probability
density.
Fig8. One-way trip time probability density function in US
As shown in fig.8. The horizontal axis is represented as one
way trip time while the vertical axis represented as probability
density.
Fig9. Detection rate versus delay interval (Note: The rate is
for detecting one bit).
As shown in fig.9. The horizontal axis is represented as delay
interval while the vertical axis represented as rate.
Fig10. Correlation between detection rate and mean of the
Poisson distribution (Note: The rate is for detecting one bit).
0
500
1000
1500
1 2 3 4 5 6 7 8 9
NumberofPacket
Packet Size (Bytes)
0
0.2
0.4
0.6
0.8
1
20 60 100 140 180
CatchProbability
Number of Malcious Tor Routers
Scheme 1
Scheme 2
0
0.2
0.4
0.6
0.8
1
1.2
ProbabilityDensity
Oneway Trip Time(ms)
Realistic
Data
0
0.2
0.4
0.6
0.8
1
1.2
Realistic
Data
Maximum
Likilihood
Estimatio
n
0
0.5
1
1.5
1 2 3 4 5
Rate
Delay interval(ms)
Scheme
2 True
Positive
Scheme
2 False
Positive
0
0.2
0.4
0.6
0.8
1
0 10 20 30 40
Rate
Mean λ of the Poission Distribution
Schem
e 2
True
Positiv
e
Schem
e 2
False
Positiv
e
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 394
As shown in fig.10. The horizontal axis is represented as
Mean λ of the position distribution while the vertical axis
represented as rate.
CONCLUSIONS
In this paper we develop a custom simulator Tor network
which demonstrates a new cell counting based attack. Ling et
al. [22] presented a mechanism where an attacker can make a
new cell counting based attack on Tor network. We
implemented this network using custom Java simulator which
demonstrates the typical behavior of sender node, receiver
node, router node and attacker node. We performed various
experiments on the proposed network with regard to cell
counting attack. The experimental results revealed that the
attack mechanism is successful.
REFERENCES
[1] X. Fu,Y. Zhu, B.Graham, R. Bettati, andW. Zhao, “On
flow marking attacks in wireless anonymous communication
networks,” in Proc.IEEE ICDCS, Apr. 2005, pp. 493–503
[2] L. Øverlier and P. Syverson, “Locating hidden servers,” in
Proc. IEEE S&P, May 2006, pp. 100–114
[3] G. Danezis, R. Dingledine, and N. Mathewson,
“Mixminion: Design of a type III anonymous remailer
protocol,” in Proc. IEEE S&P, May 2003, pp. 2–15.
[4] R. Dingledine, N. Mathewson, and P. Syverson, “Tor: The
secondgeneration onion router,” in Proc. 13th USENIX
Security Symp., Aug. 2004, p. 21.
[5] “Anonymizer, Inc.,” 2009 [Online]. Available:
http://www.anonymizer.com/
[6] Y. Zhu, X. Fu, B. Graham, R. Bettati, and W. Zhao, “On
flow correlation attacks and countermeasures in Mix
networks,” in Proc. PET, May 2004, pp. 735–742
[7] B. N. Levine,M. K. Reiter, C.Wang, andM. Wright,
“Timing attacks in low-latency MIX systems,” in Proc. FC,
Feb. 2004, pp. 251–565
[8] Q. X. Sun, D. R. Simon, Y. Wang, W. Russell, V. N.
Padmanabhan, and L. L. Qiu, “Statistical identification of
encrypted Web browsing traffic,” in Proc. IEEE S&P, May
2002, pp. 19–30.
[9] C. V.Wright, L. Ballard, F. Monrose, and G.M.Masson,
“Language identification of encrypted VoIP traffic: Alejandra
y Roberto or Alice and Bob?,” in Proc. 16th Annu. USENIX
Security Symp., Aug. 2007, pp. 43–54.
[10] M. Liberatore and B. N. Levine, “Inferring the source of
encrypted HTTP connections,” in Proc. ACM CCS, Oct. 2006,
pp. 255–263.
[11] D. X. Song, D. Wagner, and X. Tian, “Timing analysis of
keystrokes and timing attacks on SSH,” in Proc. 10th USENIX
Security Symp., Aug. 2001, p. 25.
[12] C. V.Wright, L. Ballard, S. E. Coull, F.Monrose, and G.
M. Masson, “Spot me if you can: Uncovering spoken phrases
in encrypted VoIP conversation,” in Proc. IEEE S&P, May
2008, pp. 35–49.
[13] X. Wang and D. S. Reeves, “Robust correlation of
encrypted attack traffic through stepping stones by
manipulation of inter-packet delays,” in Proc. ACM CCS,
Nov. 2003, pp. 20–29
[14] X. Wang, S. Chen, and S. Jajodia, “Tracking anonymous
peer-to-peer VoIP calls on the internet,” in Proc. 12th ACM
CCS, Nov. 2005, pp. 81–91.
[15] W. Yu, X. Fu, S. Graham, D. Xuan, and W. Zhao,
“DSSS-based flow marking technique for invisible traceback,”
in Proc. IEEE S&P, May 2007, pp. 18–32.
[16] S. J. Murdoch and G. Danezis, “Low-cost traffic analysis
of Tor,” in Proc. IEEE S&P, May 2006, pp. 183–195.
[17] P. Peng, P. Ning, and D. S. Reeves, “On the secrecy of
timing-based active watermarking trace-back techniques,” in
Proc. IEEE S&P, May 2006, pp. 335–349
[18] N. Kiyavash, A. Houmansadr, and N. Borisov, “Multi-
flow attacks against network flow watermarking schemes,” in
Proc. USENIX SecuritySymp., 2008, pp. 307–320 LING et
al.: NEW CELL-COUNTING-BASED ATTACK AGAINST
TOR 1261
[19] Y. J. Pyun, Y. H. Park, X. Wang, D. S. Reeves, and P.
Ning, “Tracing traffic through intermediate hosts that
repacketize flows,” in Proc.IEEE INFOCOM, May 2007, pp.
634–642
[20] X.Wang, S. Chen, and S. Jajodia, “Network flow
watermarking attack on low-latency anonymous
communication systems,” in Proc. IEEES&P, May 2007, pp.
116–130.
[21] Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong
Xuan, and Weijia Jia, “A New Cell-Counting-Based Attack
Against Tor”. IEEE/ACM TRANSACTIONS ON
NETWORKING, VOL. 20, NO 4, AUGUST 2012.
BIOGRAPHIES
Mamatha.Ch, she is pursuing M.Tech
(CSE) in MRCET, Hyderabad, AP,
INDIA. She has received B.Tech Degree
in Computer Science and Engineering.
Her main research interest includes
Networking.
Manoj Kumar.G, He is working as an
assistant professor in MRCET. He has
received MCA Degree in Computer
Science and M.Tech degree in Computer
Science and Engineering. His main
Research interests include Networking

More Related Content

What's hot

Selective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholesSelective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholesIJNSA Journal
 
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...ijsptm
 
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSLOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSEditor IJCATR
 
Exclusion of Denial of Service Attack using Graph Theory in MANETS
Exclusion of Denial of Service Attack using Graph Theory in MANETSExclusion of Denial of Service Attack using Graph Theory in MANETS
Exclusion of Denial of Service Attack using Graph Theory in MANETSIRJET Journal
 
Wormhole attack mitigation in manet a
Wormhole attack mitigation in manet aWormhole attack mitigation in manet a
Wormhole attack mitigation in manet aIJCNCJournal
 
Comparison of the performance of trsaodv with aodv under blackhole attack in ...
Comparison of the performance of trsaodv with aodv under blackhole attack in ...Comparison of the performance of trsaodv with aodv under blackhole attack in ...
Comparison of the performance of trsaodv with aodv under blackhole attack in ...eSAT Journals
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...ijp2p
 
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONSAN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONSIJNSA Journal
 

What's hot (12)

Selective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholesSelective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholes
 
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
 
B035410013
B035410013B035410013
B035410013
 
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSLOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
 
A43030104
A43030104A43030104
A43030104
 
Exclusion of Denial of Service Attack using Graph Theory in MANETS
Exclusion of Denial of Service Attack using Graph Theory in MANETSExclusion of Denial of Service Attack using Graph Theory in MANETS
Exclusion of Denial of Service Attack using Graph Theory in MANETS
 
Wormhole attack mitigation in manet a
Wormhole attack mitigation in manet aWormhole attack mitigation in manet a
Wormhole attack mitigation in manet a
 
Comparison of the performance of trsaodv with aodv under blackhole attack in ...
Comparison of the performance of trsaodv with aodv under blackhole attack in ...Comparison of the performance of trsaodv with aodv under blackhole attack in ...
Comparison of the performance of trsaodv with aodv under blackhole attack in ...
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
 
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONSAN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
 
I1086066
I1086066I1086066
I1086066
 
Dn36682688
Dn36682688Dn36682688
Dn36682688
 

Viewers also liked

Performance comparison of row per slave and rows set per slave method in pvm ...
Performance comparison of row per slave and rows set per slave method in pvm ...Performance comparison of row per slave and rows set per slave method in pvm ...
Performance comparison of row per slave and rows set per slave method in pvm ...eSAT Journals
 
The common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationThe common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationeSAT Journals
 
A treament of domestic sewage and generation of bio sludge using natural coag...
A treament of domestic sewage and generation of bio sludge using natural coag...A treament of domestic sewage and generation of bio sludge using natural coag...
A treament of domestic sewage and generation of bio sludge using natural coag...eSAT Journals
 
Facial expression identification using four bit co- occurrence matrixfeatures...
Facial expression identification using four bit co- occurrence matrixfeatures...Facial expression identification using four bit co- occurrence matrixfeatures...
Facial expression identification using four bit co- occurrence matrixfeatures...eSAT Journals
 
Android application to locate and track mobile phones(aaltm) an implementati...
Android application to locate and track mobile phones(aaltm)  an implementati...Android application to locate and track mobile phones(aaltm)  an implementati...
Android application to locate and track mobile phones(aaltm) an implementati...eSAT Journals
 
Advanced manufacturing technology adoption in manufacturing companies in kenya
Advanced manufacturing technology adoption in manufacturing companies in kenyaAdvanced manufacturing technology adoption in manufacturing companies in kenya
Advanced manufacturing technology adoption in manufacturing companies in kenyaeSAT Journals
 
Wear characteristics of pure aluminium, al alloy & al-alumina metal mtrix...
Wear characteristics of pure aluminium, al alloy & al-alumina metal mtrix...Wear characteristics of pure aluminium, al alloy & al-alumina metal mtrix...
Wear characteristics of pure aluminium, al alloy & al-alumina metal mtrix...eSAT Journals
 
To study the application of nanorefrigerant in refrigeration system a review
To study the application of nanorefrigerant in refrigeration system a reviewTo study the application of nanorefrigerant in refrigeration system a review
To study the application of nanorefrigerant in refrigeration system a revieweSAT Journals
 
Quality of service (qos) in wi max
Quality of service (qos) in wi maxQuality of service (qos) in wi max
Quality of service (qos) in wi maxeSAT Journals
 
Earthquake prediction by using evidential reasoning approach
Earthquake prediction by using evidential reasoning approachEarthquake prediction by using evidential reasoning approach
Earthquake prediction by using evidential reasoning approacheSAT Journals
 
Selection of alignment for feeder canal from pillaipally flood flow canal to ...
Selection of alignment for feeder canal from pillaipally flood flow canal to ...Selection of alignment for feeder canal from pillaipally flood flow canal to ...
Selection of alignment for feeder canal from pillaipally flood flow canal to ...eSAT Journals
 
A review on vibration mitigation of boring bar using passive damping techniques
A review on vibration mitigation of boring bar using passive damping techniquesA review on vibration mitigation of boring bar using passive damping techniques
A review on vibration mitigation of boring bar using passive damping techniqueseSAT Journals
 
Design and analysis of automated spray gun for rh vessel
Design and analysis of automated spray gun for rh vesselDesign and analysis of automated spray gun for rh vessel
Design and analysis of automated spray gun for rh vesseleSAT Journals
 
Experimental study on shear strength behavior of super plasticized fiber rein...
Experimental study on shear strength behavior of super plasticized fiber rein...Experimental study on shear strength behavior of super plasticized fiber rein...
Experimental study on shear strength behavior of super plasticized fiber rein...eSAT Journals
 
All optical network design with even and odd nodes
All optical network design with even and odd nodesAll optical network design with even and odd nodes
All optical network design with even and odd nodeseSAT Journals
 
Voice recognition based advance patients room automation
Voice recognition based advance patients room automationVoice recognition based advance patients room automation
Voice recognition based advance patients room automationeSAT Journals
 
A critical study on availability and capacity utilization of side discharge l...
A critical study on availability and capacity utilization of side discharge l...A critical study on availability and capacity utilization of side discharge l...
A critical study on availability and capacity utilization of side discharge l...eSAT Journals
 
Balancing the line by using heuristic method based on cpm in salbp –a case study
Balancing the line by using heuristic method based on cpm in salbp –a case studyBalancing the line by using heuristic method based on cpm in salbp –a case study
Balancing the line by using heuristic method based on cpm in salbp –a case studyeSAT Journals
 
Design and analysis of internal combustion compressed air hydrid engine (inco)
Design and analysis of internal combustion compressed air hydrid engine (inco)Design and analysis of internal combustion compressed air hydrid engine (inco)
Design and analysis of internal combustion compressed air hydrid engine (inco)eSAT Journals
 

Viewers also liked (19)

Performance comparison of row per slave and rows set per slave method in pvm ...
Performance comparison of row per slave and rows set per slave method in pvm ...Performance comparison of row per slave and rows set per slave method in pvm ...
Performance comparison of row per slave and rows set per slave method in pvm ...
 
The common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationThe common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generation
 
A treament of domestic sewage and generation of bio sludge using natural coag...
A treament of domestic sewage and generation of bio sludge using natural coag...A treament of domestic sewage and generation of bio sludge using natural coag...
A treament of domestic sewage and generation of bio sludge using natural coag...
 
Facial expression identification using four bit co- occurrence matrixfeatures...
Facial expression identification using four bit co- occurrence matrixfeatures...Facial expression identification using four bit co- occurrence matrixfeatures...
Facial expression identification using four bit co- occurrence matrixfeatures...
 
Android application to locate and track mobile phones(aaltm) an implementati...
Android application to locate and track mobile phones(aaltm)  an implementati...Android application to locate and track mobile phones(aaltm)  an implementati...
Android application to locate and track mobile phones(aaltm) an implementati...
 
Advanced manufacturing technology adoption in manufacturing companies in kenya
Advanced manufacturing technology adoption in manufacturing companies in kenyaAdvanced manufacturing technology adoption in manufacturing companies in kenya
Advanced manufacturing technology adoption in manufacturing companies in kenya
 
Wear characteristics of pure aluminium, al alloy & al-alumina metal mtrix...
Wear characteristics of pure aluminium, al alloy & al-alumina metal mtrix...Wear characteristics of pure aluminium, al alloy & al-alumina metal mtrix...
Wear characteristics of pure aluminium, al alloy & al-alumina metal mtrix...
 
To study the application of nanorefrigerant in refrigeration system a review
To study the application of nanorefrigerant in refrigeration system a reviewTo study the application of nanorefrigerant in refrigeration system a review
To study the application of nanorefrigerant in refrigeration system a review
 
Quality of service (qos) in wi max
Quality of service (qos) in wi maxQuality of service (qos) in wi max
Quality of service (qos) in wi max
 
Earthquake prediction by using evidential reasoning approach
Earthquake prediction by using evidential reasoning approachEarthquake prediction by using evidential reasoning approach
Earthquake prediction by using evidential reasoning approach
 
Selection of alignment for feeder canal from pillaipally flood flow canal to ...
Selection of alignment for feeder canal from pillaipally flood flow canal to ...Selection of alignment for feeder canal from pillaipally flood flow canal to ...
Selection of alignment for feeder canal from pillaipally flood flow canal to ...
 
A review on vibration mitigation of boring bar using passive damping techniques
A review on vibration mitigation of boring bar using passive damping techniquesA review on vibration mitigation of boring bar using passive damping techniques
A review on vibration mitigation of boring bar using passive damping techniques
 
Design and analysis of automated spray gun for rh vessel
Design and analysis of automated spray gun for rh vesselDesign and analysis of automated spray gun for rh vessel
Design and analysis of automated spray gun for rh vessel
 
Experimental study on shear strength behavior of super plasticized fiber rein...
Experimental study on shear strength behavior of super plasticized fiber rein...Experimental study on shear strength behavior of super plasticized fiber rein...
Experimental study on shear strength behavior of super plasticized fiber rein...
 
All optical network design with even and odd nodes
All optical network design with even and odd nodesAll optical network design with even and odd nodes
All optical network design with even and odd nodes
 
Voice recognition based advance patients room automation
Voice recognition based advance patients room automationVoice recognition based advance patients room automation
Voice recognition based advance patients room automation
 
A critical study on availability and capacity utilization of side discharge l...
A critical study on availability and capacity utilization of side discharge l...A critical study on availability and capacity utilization of side discharge l...
A critical study on availability and capacity utilization of side discharge l...
 
Balancing the line by using heuristic method based on cpm in salbp –a case study
Balancing the line by using heuristic method based on cpm in salbp –a case studyBalancing the line by using heuristic method based on cpm in salbp –a case study
Balancing the line by using heuristic method based on cpm in salbp –a case study
 
Design and analysis of internal combustion compressed air hydrid engine (inco)
Design and analysis of internal combustion compressed air hydrid engine (inco)Design and analysis of internal combustion compressed air hydrid engine (inco)
Design and analysis of internal combustion compressed air hydrid engine (inco)
 

Similar to Modeling and prevention of cell counting based attacks on tor

A Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSNA Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSNiosrjce
 
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPReactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPIOSR Journals
 
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...IOSR Journals
 
Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksijdpsjournal
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
 
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and ClusteringModified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and Clusteringidescitation
 
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...IJNSA Journal
 
Performance investigation of re shuffling packet attack on transport layer pr...
Performance investigation of re shuffling packet attack on transport layer pr...Performance investigation of re shuffling packet attack on transport layer pr...
Performance investigation of re shuffling packet attack on transport layer pr...eSAT Journals
 
Performance investigation of re shuffling packet
Performance investigation of re shuffling packetPerformance investigation of re shuffling packet
Performance investigation of re shuffling packeteSAT Publishing House
 
Prevention against new cell counting attack against tor network
Prevention against new cell counting attack against tor networkPrevention against new cell counting attack against tor network
Prevention against new cell counting attack against tor networkeSAT Journals
 
Prevention against new cell counting attack against tor network
Prevention against new cell counting attack against tor networkPrevention against new cell counting attack against tor network
Prevention against new cell counting attack against tor networkeSAT Publishing House
 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...ijsrd.com
 
Prevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV ProtocolPrevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV ProtocolIJSRD
 
Prevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV ProtocolPrevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV ProtocolIJSRD
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...ijp2p
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...ijp2p
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...ijp2p
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...ijp2p
 

Similar to Modeling and prevention of cell counting based attacks on tor (20)

A Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSNA Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSN
 
C010631015
C010631015C010631015
C010631015
 
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPReactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
 
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
 
Ijcatr04051009
Ijcatr04051009Ijcatr04051009
Ijcatr04051009
 
Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networks
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
 
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and ClusteringModified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
 
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
 
Performance investigation of re shuffling packet attack on transport layer pr...
Performance investigation of re shuffling packet attack on transport layer pr...Performance investigation of re shuffling packet attack on transport layer pr...
Performance investigation of re shuffling packet attack on transport layer pr...
 
Performance investigation of re shuffling packet
Performance investigation of re shuffling packetPerformance investigation of re shuffling packet
Performance investigation of re shuffling packet
 
Prevention against new cell counting attack against tor network
Prevention against new cell counting attack against tor networkPrevention against new cell counting attack against tor network
Prevention against new cell counting attack against tor network
 
Prevention against new cell counting attack against tor network
Prevention against new cell counting attack against tor networkPrevention against new cell counting attack against tor network
Prevention against new cell counting attack against tor network
 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
 
Prevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV ProtocolPrevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV Protocol
 
Prevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV ProtocolPrevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV Protocol
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solidnamansinghjarodiya
 
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书rnrncn29
 
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESCME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESkarthi keyan
 
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTFUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTSneha Padhiar
 
OOP concepts -in-Python programming language
OOP concepts -in-Python programming languageOOP concepts -in-Python programming language
OOP concepts -in-Python programming languageSmritiSharma901052
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Sumanth A
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHSneha Padhiar
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodManicka Mamallan Andavar
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfDrew Moseley
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdfHafizMudaserAhmad
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfisabel213075
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfBalamuruganV28
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsResearcher Researcher
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxStephen Sitton
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdfAkritiPradhan2
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 

Recently uploaded (20)

Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solid
 
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
 
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESCME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
 
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTFUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
 
OOP concepts -in-Python programming language
OOP concepts -in-Python programming languageOOP concepts -in-Python programming language
OOP concepts -in-Python programming language
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument method
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdf
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdf
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdf
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending Actuators
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptx
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 

Modeling and prevention of cell counting based attacks on tor

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 391 MODELING AND PREVENTION OF CELL COUNTING BASED ATTACKS ON TOR Mamatha.Ch1 , Manoj Kumar.G2 1 Student, 2 Asst.Professor, Department of CSE, MRCET, Andhra Pradesh, India mamathachakilela@gmail.com, manojvarma9@gmail.com Abstract Many anonymous networks came into existence. For instance Tor allows its users to gain access to services anonymously. This network causes most of the attacks as the adversaries can hide their identity and make attacks successfully from a remote place. By making a new attack on Tor can find the vulnerability of the Tor. Ling et al. presented a new cell counting mechanism for making an attack on Tor. In this paper we implemented a custom simulator that models a Tor and demonstrates the cell counting attack by simulating nodes like sender, receiver, onion router and attacker. The experimental results revealed that the proposed attack mechanism is effective. Keywords: Anonymous network, Tor, attacker model, cell counting ---------------------------------------------------------------------***------------------------------------------------------------------------- 1. INTRODUCTION Privacy and integrity have received great attention in all kinds of networks. With popularity of Internet various kinds of networks came into existence. One such network is known as Tor. This is an anonymous network where the users of the network can gain access to services of network without disclosing or proving identity. However, this kind of network is vulnerable to security attacks. The attacks are made by adversaries from a remote place through intermediary nodes. In anonymous networks encryption along can’t make the network secure [1],[2]. Researchers worked on various models to protect such networks from malicious networks. Many anonymous applications were investigated in [3]. The anonymous applications can also be sued for file sharing and also web browsing [4], [5]. The remainder of this paper is structured as follows. Section 2 reviews literature. Section 3 provides information about the proposed model. Section 4 presents experimental results while section 5 concludes the paper. 2. RELATED WORK Networks of all kinds are vulnerable unless certain security measures are considered. A good security review of network systems is found in [4], [3]. With respect to asynchronous communication much research went on earlier on mix networks. Traffic analysis techniques are used to detect and prevent attacks in mix systems. The existing techniques are categorized into two types namely active watermarking techniques and passive traffic analysis. Passive traffic analysis is used to find attacks where attackers record traffic and then reuse it as explored in [6] and [7]. By analyzing patterns of encrypted content also, the attackers are able to extract sensitive information as the recent study explores [8], [9], [10], and [11]. HTTP traffic with packets is explored in [10] for identifying web pages satisfactorily. The distribution of packet sizes in encrypted VoIP content is investigated in [9]. Spoken phases can be intercepted by eavesdropper or adversary when it is of VoIP kind as explored in [12]. Active watermarking on the other hand embeds signals into traffic as discussed widely in [13], [14], [15], and [16]. These techniques also are capable of reducing false positives by using passive traffic analysis. Flow-watermarking scheme was proposed by Yu et al. [15] to identify secret communication in mix networks. In [2] compromised mix router is studied using a security scheme. In [13] timing – based attacks pertaining to watermarking and the trace back. The feasibility of timing based attacks is also explored by Wang et al. [14]. The secrecy of timing – based attacks and the watermarking for making trace back are explored in [13] and [17]. In [18] a multi-flow approach is proposed to watermark that is interval – based [19], [20]. Other kind of water marks known as DSSS-based watermarks are explored in [15]. For observing long silence periods multi-flow-based watermarking is used. 3. PROTOTYPE IMPLEMENTATION We have implemented a custom simulator which models a sender, receiver, router, and attacker. Our aim is to demonstrate a cell counting attack in the anonymous network. The application is built in a PC with 4 GB RAM, Core 2 Dual processor running Windows XP OS. The representations of sender node, receiver node, and router and attacker node are presented here. Fig.2 shows the UI of sender node.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 392 Fig. 1– Typical sender node As can be seen in fig. 2, the GUI shows the typical sender node behavior. The sender node sends data to a receiver which is sent through various router nodes. The router node forwards the data to destination node through one or more intermediate routers. The router node is as shown in fig. 3. Fig. 2 – A typical router node As can be seen in fig. 2, the router node shows the status of incoming and outgoing packets. It also shows any packets which are subjected to attacks. The router can forward data it receives to either other router or destination. Fig.3 – A typical receiver node As can be seen in fig. 3, the user interface of the receiver node is shown. This program simulates the receiver’s behavior in the network. Fig.4 – A typical attacker node As can be seen in fig. 4, the user interface of typical attacker is simulated. The attacker node is used to demonstrate to make a cell counting attack on the network. 4. EXPERIMENTAL RESULTS Various experiments are made in the simulated network in terms of packet size, number of malicious routers, delay probability, maximal likelihood and so on. The experimental results are presented here. Fig. 1 shows the number of packets and packet size.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 393 Fig. 5- Number of packets versus packet size As shown in fig 5 the horizontal axis represents packet size while the vertical axis represents number of packets. Fig6. Probability that a circuit chooses the malicious routers as entry and exit routers versus number of malicious Tor routers As shown in fig.6 the horizontal axis is represented as number of malicious tor routers while the vertical axis represented as catch probability Fig7.One-way trip time probability density function As shown in fig.7. The horizontal axis is represented as one way trip time while the vertical axis represented as probability density. Fig8. One-way trip time probability density function in US As shown in fig.8. The horizontal axis is represented as one way trip time while the vertical axis represented as probability density. Fig9. Detection rate versus delay interval (Note: The rate is for detecting one bit). As shown in fig.9. The horizontal axis is represented as delay interval while the vertical axis represented as rate. Fig10. Correlation between detection rate and mean of the Poisson distribution (Note: The rate is for detecting one bit). 0 500 1000 1500 1 2 3 4 5 6 7 8 9 NumberofPacket Packet Size (Bytes) 0 0.2 0.4 0.6 0.8 1 20 60 100 140 180 CatchProbability Number of Malcious Tor Routers Scheme 1 Scheme 2 0 0.2 0.4 0.6 0.8 1 1.2 ProbabilityDensity Oneway Trip Time(ms) Realistic Data 0 0.2 0.4 0.6 0.8 1 1.2 Realistic Data Maximum Likilihood Estimatio n 0 0.5 1 1.5 1 2 3 4 5 Rate Delay interval(ms) Scheme 2 True Positive Scheme 2 False Positive 0 0.2 0.4 0.6 0.8 1 0 10 20 30 40 Rate Mean λ of the Poission Distribution Schem e 2 True Positiv e Schem e 2 False Positiv e
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 394 As shown in fig.10. The horizontal axis is represented as Mean λ of the position distribution while the vertical axis represented as rate. CONCLUSIONS In this paper we develop a custom simulator Tor network which demonstrates a new cell counting based attack. Ling et al. [22] presented a mechanism where an attacker can make a new cell counting based attack on Tor network. We implemented this network using custom Java simulator which demonstrates the typical behavior of sender node, receiver node, router node and attacker node. We performed various experiments on the proposed network with regard to cell counting attack. The experimental results revealed that the attack mechanism is successful. REFERENCES [1] X. Fu,Y. Zhu, B.Graham, R. Bettati, andW. Zhao, “On flow marking attacks in wireless anonymous communication networks,” in Proc.IEEE ICDCS, Apr. 2005, pp. 493–503 [2] L. Øverlier and P. Syverson, “Locating hidden servers,” in Proc. IEEE S&P, May 2006, pp. 100–114 [3] G. Danezis, R. Dingledine, and N. Mathewson, “Mixminion: Design of a type III anonymous remailer protocol,” in Proc. IEEE S&P, May 2003, pp. 2–15. [4] R. Dingledine, N. Mathewson, and P. Syverson, “Tor: The secondgeneration onion router,” in Proc. 13th USENIX Security Symp., Aug. 2004, p. 21. [5] “Anonymizer, Inc.,” 2009 [Online]. Available: http://www.anonymizer.com/ [6] Y. Zhu, X. Fu, B. Graham, R. Bettati, and W. Zhao, “On flow correlation attacks and countermeasures in Mix networks,” in Proc. PET, May 2004, pp. 735–742 [7] B. N. Levine,M. K. Reiter, C.Wang, andM. Wright, “Timing attacks in low-latency MIX systems,” in Proc. FC, Feb. 2004, pp. 251–565 [8] Q. X. Sun, D. R. Simon, Y. Wang, W. Russell, V. N. Padmanabhan, and L. L. Qiu, “Statistical identification of encrypted Web browsing traffic,” in Proc. IEEE S&P, May 2002, pp. 19–30. [9] C. V.Wright, L. Ballard, F. Monrose, and G.M.Masson, “Language identification of encrypted VoIP traffic: Alejandra y Roberto or Alice and Bob?,” in Proc. 16th Annu. USENIX Security Symp., Aug. 2007, pp. 43–54. [10] M. Liberatore and B. N. Levine, “Inferring the source of encrypted HTTP connections,” in Proc. ACM CCS, Oct. 2006, pp. 255–263. [11] D. X. Song, D. Wagner, and X. Tian, “Timing analysis of keystrokes and timing attacks on SSH,” in Proc. 10th USENIX Security Symp., Aug. 2001, p. 25. [12] C. V.Wright, L. Ballard, S. E. Coull, F.Monrose, and G. M. Masson, “Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversation,” in Proc. IEEE S&P, May 2008, pp. 35–49. [13] X. Wang and D. S. Reeves, “Robust correlation of encrypted attack traffic through stepping stones by manipulation of inter-packet delays,” in Proc. ACM CCS, Nov. 2003, pp. 20–29 [14] X. Wang, S. Chen, and S. Jajodia, “Tracking anonymous peer-to-peer VoIP calls on the internet,” in Proc. 12th ACM CCS, Nov. 2005, pp. 81–91. [15] W. Yu, X. Fu, S. Graham, D. Xuan, and W. Zhao, “DSSS-based flow marking technique for invisible traceback,” in Proc. IEEE S&P, May 2007, pp. 18–32. [16] S. J. Murdoch and G. Danezis, “Low-cost traffic analysis of Tor,” in Proc. IEEE S&P, May 2006, pp. 183–195. [17] P. Peng, P. Ning, and D. S. Reeves, “On the secrecy of timing-based active watermarking trace-back techniques,” in Proc. IEEE S&P, May 2006, pp. 335–349 [18] N. Kiyavash, A. Houmansadr, and N. Borisov, “Multi- flow attacks against network flow watermarking schemes,” in Proc. USENIX SecuritySymp., 2008, pp. 307–320 LING et al.: NEW CELL-COUNTING-BASED ATTACK AGAINST TOR 1261 [19] Y. J. Pyun, Y. H. Park, X. Wang, D. S. Reeves, and P. Ning, “Tracing traffic through intermediate hosts that repacketize flows,” in Proc.IEEE INFOCOM, May 2007, pp. 634–642 [20] X.Wang, S. Chen, and S. Jajodia, “Network flow watermarking attack on low-latency anonymous communication systems,” in Proc. IEEES&P, May 2007, pp. 116–130. [21] Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xuan, and Weijia Jia, “A New Cell-Counting-Based Attack Against Tor”. IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 20, NO 4, AUGUST 2012. BIOGRAPHIES Mamatha.Ch, she is pursuing M.Tech (CSE) in MRCET, Hyderabad, AP, INDIA. She has received B.Tech Degree in Computer Science and Engineering. Her main research interest includes Networking. Manoj Kumar.G, He is working as an assistant professor in MRCET. He has received MCA Degree in Computer Science and M.Tech degree in Computer Science and Engineering. His main Research interests include Networking