SlideShare una empresa de Scribd logo
1 de 13
Anonymous Traffic Network
By
Apurv Singh Gautam
Anushka Nagar
Rohan Nevrikar
Introduction
• Anonymity and privacy are the two major concerns of today’s
internet.
• Anonymous communication networks like Tor hide the identity of an
entity in that particular network.
• Because of restriction policies deployed by law enforcements, more
and more users support Tor world-wide, by contributing their
resources to the network.
• The objective of this network is not to create complete anonymity,
but anonymous routing.
History
• In 1995, David Goldschlag, Michael Reed and Paul Syverson started the
research on Onion Routing.
• According to their belief, authentication of someone’s identity can be done
by the data which is sent through the network and it need not be done
through one’s location.
• In October 2003, the Tor network was launched and Tor code was made
available for free under a license from MIT.
• By the end of 2004, there were over 100 Tor nodes on over 3 continents. By
2011, Tor nodes grew up to 2000 worldwide.
• In today’s time, there are over 6000 Tor relays inside the network, serving
over 1.5 million users.
Overview of Onion Routing
• Onion routing is a technique for anonymous communication over a
computer network.
• This is achieved by a set of encrypted layers and frequently changing paths
between a subset of the routers that participates in the routing system.
• Messages are encapsulated in layers of encryption, analogous to layers of
an onion .
• The encrypted data is transmitted through a series of network nodes called
onion routers, each of them uncovers data’s destination.
• When the final layer is decrypted, the message arrives at its destination.
• The sender remains anonymous because each intermediary knows only the
location of the immediately preceding and following nodes.
Working of anonymous network
Traffic and Routing
• For sending data through Tor network, a circuit has to be set up from the
source (entry point).
• Key exchange happens between entry point and the first hop using Diffie-
Hellman key exchange, a symmetric session key is negotiated.
• At each node, the messages are encrypted using the negotiated session
key, or if session key is not available then onion key of the receiving host is
used.
• Each router decrypts the routing information of the next hop but it is
unable to see from where the data is coming from or what is its destination
or data that is encrypted within.
• Not a single node in the path can determine what the data is and the exit
node has no information about where the data has originated from.
Hidden Services in Anonymous Network
• Web services are prone to DDoS and various physical attacks. To resist such
attacks even from those who have authorized access to the service, one
can hide both the logical and physical location of the service.
• To hide the location of service on the network as well as its physical
location, Tor uses a concept called rendezvous points.
• Service operator can set up a hidden service such as a web server by
generating a public/private key and selecting a number of onion routers
(introduction points) which are used to set up tunnels.
• If a user wants to access this service, he/she finds an introduction point
through Service Lookup Server and also chooses a router as rendezvous
point to which tunnel is set up, then the introduction point is informed
about the rendezvous point and it forwards this information to the service
owner.
Onion analogy
Security Issues
• Although data is encrypted along each of the relay nodes, it decrypts
at the final node or exit node, and the path from exit node to the
destination is unprotected if the requested site does not use SSL.
• The exit node can potentially monitor the user's internet activity,
keeping track of pages that the user visited.
• If the user's machine is compromised by malware, then the user's
identity is no longer anonymous.
How exit node can be compromised
Tracing of Anonymous Network
• There are some attacks that can reveal the identity of a Tor user up to
some extent.
• The main attack is timing analysis by watching packets leaving a user and
entering a target server which can be correlated and probable user can be
guessed.
• By observing a traffic at an exit node one can correlate different traffic
streams that can give some information about users.
• There is also a way to attack user’s anonymity which can be carried out
with Java applets.
• Another way of tracking users is by IP traceback which can be used to find
the origin of anonymous traffic. It can be deployed if there is a cooperation
between Internet Service Providers (ISPs).
Conclusion
• Anonymous network services is a large field of research and
development
• Interests and demands the general public are increasing all the time
• Most of the anonymous systems are developed by individuals or
academic institutions.
• Tor and I2P ae the future of anonymous networking.

Más contenido relacionado

La actualidad más candente

La actualidad más candente (18)

Tor Network
Tor NetworkTor Network
Tor Network
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion Router
 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
 
Tor browser
Tor browserTor browser
Tor browser
 
Onion protocol
Onion protocolOnion protocol
Onion protocol
 
Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)Hacking Tor ( How does Tor work ?)
Hacking Tor ( How does Tor work ?)
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using Tor
 
The Onion Routing (TOR)
The Onion Routing (TOR)The Onion Routing (TOR)
The Onion Routing (TOR)
 
TOR... ALL THE THINGS
TOR... ALL THE THINGSTOR... ALL THE THINGS
TOR... ALL THE THINGS
 
Tor Pivoting Networks Share
Tor Pivoting Networks Share Tor Pivoting Networks Share
Tor Pivoting Networks Share
 
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction &  Deanonymization of Tor Users By Hitesh BhatiaDarknets - Introduction &  Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
 
Tor Presentation
Tor PresentationTor Presentation
Tor Presentation
 
TOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying MarkersTOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying Markers
 
Information security using onion routing(tor)
Information security using onion routing(tor)Information security using onion routing(tor)
Information security using onion routing(tor)
 
Tor
TorTor
Tor
 
Tor the onion router
Tor   the onion routerTor   the onion router
Tor the onion router
 
.Onion
.Onion.Onion
.Onion
 
Anonymity Systems: Tor
Anonymity Systems: TorAnonymity Systems: Tor
Anonymity Systems: Tor
 

Similar a Anonymous traffic network

Network Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptxNetwork Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptx
talkaton
 
Network Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdfNetwork Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdf
talkaton
 
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
AAKASH S
 

Similar a Anonymous traffic network (20)

Anonymity Network TOR
Anonymity Network TOR Anonymity Network TOR
Anonymity Network TOR
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
 
Dark web
Dark webDark web
Dark web
 
Introduction to Tor
Introduction to TorIntroduction to Tor
Introduction to Tor
 
Introduction To Dark Web
Introduction To Dark WebIntroduction To Dark Web
Introduction To Dark Web
 
Anonymity in the web based on routing protocols
Anonymity in the web based on routing protocolsAnonymity in the web based on routing protocols
Anonymity in the web based on routing protocols
 
Dark web
Dark webDark web
Dark web
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Tor
TorTor
Tor
 
Deep Web
Deep WebDeep Web
Deep Web
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber security
 
Network Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptxNetwork Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptx
 
Network Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdfNetwork Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdf
 
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed BedewiBalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
 
lecture 7.pptx
lecture 7.pptxlecture 7.pptx
lecture 7.pptx
 
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
 
Security Issues in MANET
Security Issues in MANETSecurity Issues in MANET
Security Issues in MANET
 
Cryptography based misbehavior detection for opportunistic network
Cryptography based misbehavior detection for opportunistic networkCryptography based misbehavior detection for opportunistic network
Cryptography based misbehavior detection for opportunistic network
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
 
Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet? Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet?
 

Más de Apurv Singh Gautam

Más de Apurv Singh Gautam (15)

Automating Threat Hunting on the Dark Web and other nitty-gritty things
Automating Threat Hunting on the Dark Web and other nitty-gritty thingsAutomating Threat Hunting on the Dark Web and other nitty-gritty things
Automating Threat Hunting on the Dark Web and other nitty-gritty things
 
Threat Hunting on the Dark Web
Threat Hunting on the Dark WebThreat Hunting on the Dark Web
Threat Hunting on the Dark Web
 
All about Cyber Security - From the perspective of a MS student
All about Cyber Security - From the perspective of a MS studentAll about Cyber Security - From the perspective of a MS student
All about Cyber Security - From the perspective of a MS student
 
SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)
 
Cyber Security Seminar Day 2
Cyber Security Seminar Day 2Cyber Security Seminar Day 2
Cyber Security Seminar Day 2
 
Cyber Security Seminar Day 1
Cyber Security Seminar Day 1Cyber Security Seminar Day 1
Cyber Security Seminar Day 1
 
Cyber Security Fundamentals
Cyber Security FundamentalsCyber Security Fundamentals
Cyber Security Fundamentals
 
Bitcoin Forensics
Bitcoin ForensicsBitcoin Forensics
Bitcoin Forensics
 
Log Out Cyber Awareness
Log Out Cyber AwarenessLog Out Cyber Awareness
Log Out Cyber Awareness
 
OSINT
OSINTOSINT
OSINT
 
Intro to Network Vapt
Intro to Network VaptIntro to Network Vapt
Intro to Network Vapt
 
Security News Bytes (Aug Sept 2017)
Security News Bytes (Aug Sept 2017)Security News Bytes (Aug Sept 2017)
Security News Bytes (Aug Sept 2017)
 
Flexible Displays
Flexible DisplaysFlexible Displays
Flexible Displays
 
India against corruption
India against corruptionIndia against corruption
India against corruption
 
Encrypted database management system
Encrypted database management systemEncrypted database management system
Encrypted database management system
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Anonymous traffic network

  • 1. Anonymous Traffic Network By Apurv Singh Gautam Anushka Nagar Rohan Nevrikar
  • 2. Introduction • Anonymity and privacy are the two major concerns of today’s internet. • Anonymous communication networks like Tor hide the identity of an entity in that particular network. • Because of restriction policies deployed by law enforcements, more and more users support Tor world-wide, by contributing their resources to the network. • The objective of this network is not to create complete anonymity, but anonymous routing.
  • 3. History • In 1995, David Goldschlag, Michael Reed and Paul Syverson started the research on Onion Routing. • According to their belief, authentication of someone’s identity can be done by the data which is sent through the network and it need not be done through one’s location. • In October 2003, the Tor network was launched and Tor code was made available for free under a license from MIT. • By the end of 2004, there were over 100 Tor nodes on over 3 continents. By 2011, Tor nodes grew up to 2000 worldwide. • In today’s time, there are over 6000 Tor relays inside the network, serving over 1.5 million users.
  • 4. Overview of Onion Routing • Onion routing is a technique for anonymous communication over a computer network. • This is achieved by a set of encrypted layers and frequently changing paths between a subset of the routers that participates in the routing system. • Messages are encapsulated in layers of encryption, analogous to layers of an onion . • The encrypted data is transmitted through a series of network nodes called onion routers, each of them uncovers data’s destination. • When the final layer is decrypted, the message arrives at its destination. • The sender remains anonymous because each intermediary knows only the location of the immediately preceding and following nodes.
  • 6.
  • 7. Traffic and Routing • For sending data through Tor network, a circuit has to be set up from the source (entry point). • Key exchange happens between entry point and the first hop using Diffie- Hellman key exchange, a symmetric session key is negotiated. • At each node, the messages are encrypted using the negotiated session key, or if session key is not available then onion key of the receiving host is used. • Each router decrypts the routing information of the next hop but it is unable to see from where the data is coming from or what is its destination or data that is encrypted within. • Not a single node in the path can determine what the data is and the exit node has no information about where the data has originated from.
  • 8. Hidden Services in Anonymous Network • Web services are prone to DDoS and various physical attacks. To resist such attacks even from those who have authorized access to the service, one can hide both the logical and physical location of the service. • To hide the location of service on the network as well as its physical location, Tor uses a concept called rendezvous points. • Service operator can set up a hidden service such as a web server by generating a public/private key and selecting a number of onion routers (introduction points) which are used to set up tunnels. • If a user wants to access this service, he/she finds an introduction point through Service Lookup Server and also chooses a router as rendezvous point to which tunnel is set up, then the introduction point is informed about the rendezvous point and it forwards this information to the service owner.
  • 10. Security Issues • Although data is encrypted along each of the relay nodes, it decrypts at the final node or exit node, and the path from exit node to the destination is unprotected if the requested site does not use SSL. • The exit node can potentially monitor the user's internet activity, keeping track of pages that the user visited. • If the user's machine is compromised by malware, then the user's identity is no longer anonymous.
  • 11. How exit node can be compromised
  • 12. Tracing of Anonymous Network • There are some attacks that can reveal the identity of a Tor user up to some extent. • The main attack is timing analysis by watching packets leaving a user and entering a target server which can be correlated and probable user can be guessed. • By observing a traffic at an exit node one can correlate different traffic streams that can give some information about users. • There is also a way to attack user’s anonymity which can be carried out with Java applets. • Another way of tracking users is by IP traceback which can be used to find the origin of anonymous traffic. It can be deployed if there is a cooperation between Internet Service Providers (ISPs).
  • 13. Conclusion • Anonymous network services is a large field of research and development • Interests and demands the general public are increasing all the time • Most of the anonymous systems are developed by individuals or academic institutions. • Tor and I2P ae the future of anonymous networking.