1 / 13

TOR – THE ONION ROUTER

TOR – THE ONION ROUTER. BY, Anish Shanmugasundaram And Yashwanth Sainath Jammi. Introduction to Tor. Tor is the second-generation onion router. Is a system intended to enable online anonymity. Allows people and groups to improve their privacy and security on the Internet.

major
Télécharger la présentation

TOR – THE ONION ROUTER

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. TOR – THE ONION ROUTER BY, AnishShanmugasundaram And YashwanthSainathJammi

  2. Introduction to Tor • Tor is the second-generation onion router. • Is a system intended to enable online anonymity. • Allows people and groups to improve their privacy and security on the Internet. • Allows people to visit websites without being tracked or monitored. • It enables to connect to those internet services blocked by their local Internet providers.

  3. How does Tor work?

  4. Contd..

  5. Contd..

  6. Design Goals • Deployability • Usability • Flexibility • Simple Design • Ensure perfect forward secrecy.

  7. Design • Overlay network on the user level. • Onion Routers route traffic. • Onion Proxy fetches directories and creates circuits on the network. • It uses TCP. • Data is sent in fixed size (bytes) cells.

  8. Limitations of Tor • Not secure against end-to-end attacks. • Tor does not try to conceal who is connected to the network. • Not P2P. • Not secure against end-to-end attacks. • No protocol normalization.

  9. Hidden Services • Hidden services are accessed through pseudomain. • It provides anonymity to servers in the form of location-hidden services. • Design goals for location hidden services • Access Control: filtering incoming requests. • Robustness: maintain a long-term pseudonymous identity. • Smear-resistance: against socially disapproved acts. • Application transparency

  10. Attacks • Active Attacks • Compromising Keys • Run a hostile OR • Passive Attacks • Observing user traffic patterns • Observing user content • End-to-end timing correlation • Attacks on the Directory Service • Destroy directory service • Subvert 1 or more directory servers • Attacks against rendezvous points • Make many introduction requests • Compromise a rendezvous point

  11. Pros and Cons • Pros • Tor is simple and doesn’t involve complicated mechanisms. • It isvery easy to use and deploy. • It is transparent for applications on end hosts. • Cons • Poor end-to-end throughput. • Current directory distribution scheme is not scalable. • Tor uses fixed-size cell, which is not efficient for some applications like telnet, ssh.

  12. Thanks!

  13. References [1]:http://en.wikipedia.org/wiki/Tor_(anonymity_network) [2]:https://www.torproject.org/about/overview.html.en

More Related