INTERNATIONAL RESEARCH JOURNAL OF SCIENCE ENGINEERING AND TECHNOLOGY

( Online- ISSN 2454 -3195 ) New DOI : 10.32804/RJSET

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 157    Submit Your Rating     Cite This   Download        Certificate

SMTP MESSAGING PROTOCOL & DETECTING EAVESDROPPING USING TOR ROUTING

    4 Author(s):  NAVEENKUMAR N,KAMALA KANNAN C,CHARAN KUMAR V,JEEVA S

Vol -  11, Issue- 2 ,         Page(s) : 11 - 20  (2021 ) DOI : https://doi.org/10.32804/RJSET

Abstract

Anonymous interactive networks such as Tor, privately guard the user's privacy by encrypting all transmissions within the surface network. However, when the transferred traffic reaches the network boundary, looking for its purpose, the actual user traffic is unavoidably exposed to the last node. As a result, users who transmit sensitive data, such as authentication credentials, in addition to such networks, are at risk of having their data captured and disclosed, without the use of encryption. Reduction of eaves can be done through malicious or damaged transmission areas, as well as any powerful network organization on the way to the destination itself. In this work, we are exploring the use of decoys at many levels to detect the presence of road impacts through hostile locations of anonymous communication systems.

Isdal, T., Piatek, M., Krishnamurthy, A., Anderson, T.: Privacy preserving P2P data sharing with oneswarm.
JAP http://anon.inf.tu-dresden.de/.
Kmail—mail client. http://kde.org/applications/internet/kmail
McCanne, S., Leres, C., Jacobson, V.: Tcpdump and libpcap. http://www.tcpdump.org/ 
Mccoy, D., Bauer, K., Grunwald, D., Kohno, T., Sicker, D.: Shining light in dark places: understanding the tor network. In: Proceedings of the 8th International Symposium on Privacy Enhancing Technologies (PETS), pp. 63–76 (2008)

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details