tor the onion router n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
TOR – THE ONION ROUTER PowerPoint Presentation
Download Presentation
TOR – THE ONION ROUTER

Loading in 2 Seconds...

play fullscreen
1 / 13

TOR – THE ONION ROUTER - PowerPoint PPT Presentation


  • 148 Views
  • Uploaded on

TOR – THE ONION ROUTER. BY, Anish Shanmugasundaram And Yashwanth Sainath Jammi. Introduction to Tor. Tor is the second-generation onion router. Is a system intended to enable online anonymity. Allows people and groups to improve their privacy and security on the Internet.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'TOR – THE ONION ROUTER' - hoyt-ramirez


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
tor the onion router

TOR – THE ONION ROUTER

BY,

AnishShanmugasundaram

And

YashwanthSainathJammi

introduction to tor
Introduction to Tor
  • Tor is the second-generation onion router.
  • Is a system intended to enable online anonymity.
  • Allows people and groups to improve their privacy and security on the Internet.
  • Allows people to visit websites without being tracked or monitored.
  • It enables to connect to those internet services blocked by their local Internet providers.
design goals
Design Goals
  • Deployability
  • Usability
  • Flexibility
  • Simple Design
  • Ensure perfect forward secrecy.
design
Design
  • Overlay network on the user level.
  • Onion Routers route traffic.
  • Onion Proxy fetches directories and creates circuits on the network.
  • It uses TCP.
  • Data is sent in fixed size (bytes) cells.
limitations of tor
Limitations of Tor
  • Not secure against end-to-end attacks.
  • Tor does not try to conceal who is connected to the network.
  • Not P2P.
  • Not secure against end-to-end attacks.
  • No protocol normalization.
hidden services
Hidden Services
  • Hidden services are accessed through pseudomain.
  • It provides anonymity to servers in the form of location-hidden services.
  • Design goals for location hidden services
    • Access Control: filtering incoming requests.
    • Robustness: maintain a long-term pseudonymous identity.
    • Smear-resistance: against socially disapproved acts.
    • Application transparency
attacks
Attacks
  • Active Attacks
    • Compromising Keys
    • Run a hostile OR
  • Passive Attacks
    • Observing user traffic patterns
    • Observing user content
    • End-to-end timing correlation
  • Attacks on the Directory Service
    • Destroy directory service
    • Subvert 1 or more directory servers
  • Attacks against rendezvous points
    • Make many introduction requests
    • Compromise a rendezvous point
pros and cons
Pros and Cons
  • Pros
    • Tor is simple and doesn’t involve complicated mechanisms.
    • It isvery easy to use and deploy.
    • It is transparent for applications on end hosts.
  • Cons
    • Poor end-to-end throughput.
    • Current directory distribution scheme is not scalable.
    • Tor uses fixed-size cell, which is not efficient for some applications like telnet, ssh.
references
References

[1]:http://en.wikipedia.org/wiki/Tor_(anonymity_network)

[2]:https://www.torproject.org/about/overview.html.en