A Review of Tor Network: Network structure, attacks and Filtering and confrontation techniques

Abstract:
The Tor network is one of the most useful and popular anonymity systems used on the web. This network works with bandwidths which volunteers provide from all around the world. By increasing the importance of security issues, surfing on the web anonymously in recent years attracted many users to Tor network and therefore it has been under a lot of research studies. Many of these studies have been implemented as attacks and in many cases the research itself also offers a solution for the problem too. Other important issue is bypassing filtering of internet in many countries by using Tor. It is a reason to filter Tor in these countries. In this paper we first review Tor network structure and then we categorize and explain attacks which are applied on the network. Finally we introduce how the network has been blocked in some countries and we also explain how Tor counteracted these filtering techniques.
Language:
Persian
Published:
Journal Monadi for Cyberspace Security (AFTA), Volume:2 Issue: 1, 2013
Page:
59
magiran.com/p1592931  
دانلود و مطالعه متن این مقاله با یکی از روشهای زیر امکان پذیر است:
اشتراک شخصی
با عضویت و پرداخت آنلاین حق اشتراک یک‌ساله به مبلغ 1,390,000ريال می‌توانید 70 عنوان مطلب دانلود کنید!
اشتراک سازمانی
به کتابخانه دانشگاه یا محل کار خود پیشنهاد کنید تا اشتراک سازمانی این پایگاه را برای دسترسی نامحدود همه کاربران به متن مطالب تهیه نمایند!
توجه!
  • حق عضویت دریافتی صرف حمایت از نشریات عضو و نگهداری، تکمیل و توسعه مگیران می‌شود.
  • پرداخت حق اشتراک و دانلود مقالات اجازه بازنشر آن در سایر رسانه‌های چاپی و دیجیتال را به کاربر نمی‌دهد.
In order to view content subscription is required

Personal subscription
Subscribe magiran.com for 70 € euros via PayPal and download 70 articles during a year.
Organization subscription
Please contact us to subscribe your university or library for unlimited access!