SlideShare una empresa de Scribd logo
1 de 20
TOR NETWORK
A Presentation by -
Prashant Rana
Roll No-13504
Department – cse
Contents
• Why do we need anonymity?
• Introducing theTor Network
• How does theTor Network work?
• Hidden Services
• Tor limitation
• Application of anonymous system (tor)
• Licit and illicit uses
• Danger of using tor
• Future direction
• Conclusion
Why do we need anonymity?
• To hide user personal information
• To hide user identity from target web site
• To hide browsing pattern from employer or ISP
• To conceal our internet usage from hackers
• Freedom ofThought and Speech
• Freedom of Social and Political Activities
Introducing theTor Network
• Tor is free software for enabling anonymous communication .
• Tor aims to conceal its users' identities and their online activity from surveillance
and traffic analysis by separating identification and routing.
• This is done by passing the data through a circuit of at least three different routers.
• The data that passes through the network is encrypted, but at the beginning and
end node, there is no encryption.
R1
R2
R3
R4
srvr1
srvr2
R5
R6
one minute later
HowTorWorks? --- Onion Routing
• A circuit is built incrementally one hop by one hop
• Onion-like encryption
• ‘Alice’ negotiates an AES key with each router
• Messages are divided into equal sized cells
• Each router knows only its predecessor and successor
• Only the Exit router (OR3) can see the message, however it does
not know where the message is from
Alice Bob
OR2
OR1
M
√M
M
OR3
M
C1 C2
C2 C3
C3 Port
Cells
• Onion routers communicate with one another, and with users’ OPs, via
TLS connections with ephemeral keys.Traffic passes along these
connections in fixed-size cells
• All data is sent in fixed size (bytes) cells
• Control cell commands:
• Padding, create, destroy
• Relay cell commands:
• Begin, data, connected, teardown, ...
HowTor Works? --- Node to Node Connection
• Tor implements Perfect Forward Secrecy (PFC) by using AES encryption
• In AES (Advanced Encryption Standard), a private key is generated and shared
between the two users, and from this key, session keys are generated
• Original keypairs are only used for signatures (i.e. to verify the authenticity of
messages)
Tor network overview
Hidden Services
• Location-hidden services allow a server to offer aTCP service without revealing its IP address.
• Tor accommodates receiver anonymity by allowing location hidden services
• Design goals for location hidden services
• Access Control: filtering incoming requests
• Robustness: maintain a long-term pseudonymous identity
• Smear-resistance: against socially disapproved acts
• Application transparency
• Allows to access onion websites and deep web.
TOR: Limitations
• DNS Leakage : the client reveals the destination to the DNS server during
DNS resolution.
• End-to-end timing correlation:An attacker watching patterns of traffic at
the initiator and the responder will be able to confirm the correspondence
with high probability.
• Eavesdropping by exit nodes:Tor does not encrypt the traffic between an
exit node and the target server.Therefore a malicious exit node can observe
traffic , identify user request and can send the wrong response.
• Tor is slow: Traffic is bouncing through ORs and even on volunteers'
computers in various parts of the world.This may cause some bottleneck
and network latency.
APPLICATIONS OF ANONYMOUS SYSTEMS (TOR)
• Privacy and security for Ordinary Internet Users: it allows people to
communicate with each other without necessarily revealing their personal network
identification and without being tracked by others.
• Censorship resistance: Tor provide a strong foundation for censorship resistance
for people living under oppressive regimes that try to limit what their citizens can
say and do on the Internet.
• Corporate /Business : Corporate or business organizations may want to keep their
data and transactions secure and secret from opponents who are regularly
monitoring their activaties . Anonymous systems can then be used to achieve
untracebility .
Licit and illicit uses
• Tor is increasingly in common use by victims of domestic violence and
the social workers and agencies which assist them
• A growing list of news organizations are using the SecureDrop software
platform to accept material for publication in a manner intended to protect
the anonymity of sources.
• It is endorsed by civil liberties groups as a method for whistleblowers and
human rights workers to communicate with journalists
Licit and illicit uses (Contd.)
• Tor is used for matters that are, or may be, illegal in some countries, e.g., to
gain access to censored information, to organize political activities, or to
circumvent laws against criticism of heads of state.
• Tor can be used for anonymous defamation, unauthorized leaks of sensitive
information and copyright infringement, distribution of illegal sexual
content, selling controlled substances, money laundering, credit card fraud,
and identity theft.
• Ironically,Tor has been used by criminal enterprises, hacktivism groups, and
law enforcement agencies at cross purposes, sometimes simultaneously
Dangers of usingTor Network
• "The more you hide the more somebody wants to know why.“
• While the inter-relay communications might be secure, the entry and exit nodes are
vulnerable to packet sniffing and
• The exit node decrypts the packet it received from its sibling on the chain of nodes
and receives your full plaintext request.This can be easily seen by the operator of
the exit node.
• Running an exit node is dangerous as all exit traffic, legal and illegal, will be traced to
your IP
• Anyone usingTOR network is on the NSA watch list under the Xkeyscore program.
Geographies of Tor
CONCLUSION
• Researches in the last 30 years has made significant progress towards
enabling private and anonymous communication on the Internet. With an
increasing level of public awareness about threats to personal privacy, such
as identity theft or online advertisers tracking user behavior, academic and
public interest in anonymous communication systems is likely to continue to
increase in the near future.As a result public and academic interest in
improving existing systems for anonymity is also increasing.This may
enable and encourage future global network design to include privacy and
anonymity as fundamental property.
References
• https://www.torproject.org/
• https://en.wikipedia.org/wiki/Tor_(anonymity_network)
• McCoy, Damon; Bauer, Kevin; Grunwald, Dirk; Kohno,Tadayoshi; Sicker, Douglas
(2008)."Shining Light in Dark Places: Understanding theTor Network". Proceedings of the 8th
International Symposium on Privacy EnhancingTechnologies. 8th International Symposium on
Privacy EnhancingTechnologies. Berlin, Germany: Springer-Verlag. pp. 63–76.
• "Tor Project Form 990 2008". Tor Project.Tor Project. 2009. Retrieved 30August 2014.
• "Tor Project Form 990 2007". Tor Project.Tor Project. 2008. Retrieved 30 August 2014.
• "Tor Project Form 990 2009". Tor Project.Tor Project. 2010. Retrieved 30 August 2014.
• Samson,Ted (5 August 2013). "Tor Browser Bundle forWindows users susceptible to info-
stealing attack". InfoWorld.
• Dingledine, Roger (7 April 2014). "OpenSSL bug CVE-2014-0160". Tor Project.
• Le Blond, Stevens; Manils, Pere; Chaabane, Abdelberi; Ali Kaafar, Mohamed; Castelluccia,
Claude; Legout, Arnaud; Dabbous,Walid (March 2011). "One Bad Apple Spoils the Bunch:
Exploiting P2P Applications toTrace and ProfileTor Users". 4th USENIX Workshop on Large-
Scale Exploits and EmergentThreats (LEET '11). National Institute for Research in Computer
Science and Control.
Q&A
ThankYou

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)
 
Tor the onion router
Tor   the onion routerTor   the onion router
Tor the onion router
 
Introduction to anonymity network tor
Introduction to anonymity network torIntroduction to anonymity network tor
Introduction to anonymity network tor
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber security
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
Dark wed
Dark wedDark wed
Dark wed
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
 
Introduction To Dark Web
Introduction To Dark WebIntroduction To Dark Web
Introduction To Dark Web
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
 
Deep web and Dark web
Deep web and Dark webDeep web and Dark web
Deep web and Dark web
 
Tor the onion router
Tor  the onion routerTor  the onion router
Tor the onion router
 
Dark web
Dark webDark web
Dark web
 
Dark web
Dark webDark web
Dark web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
The Onion Routing (TOR)
The Onion Routing (TOR)The Onion Routing (TOR)
The Onion Routing (TOR)
 
Autopsy Digital forensics tool
Autopsy Digital forensics toolAutopsy Digital forensics tool
Autopsy Digital forensics tool
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 

Destacado

I2P and the Dark Web
I2P and the Dark WebI2P and the Dark Web
I2P and the Dark WebJohn Liu
 
Encryption and decryption in TOR
Encryption and decryption in TOREncryption and decryption in TOR
Encryption and decryption in TORanjalika sinha
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using TorJack Maynard
 
The End of Anonymity on Anonymous Networks
The End of Anonymity on Anonymous NetworksThe End of Anonymity on Anonymous Networks
The End of Anonymity on Anonymous NetworksDenis Makrushin
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerAbhinav Biswas
 
Anonymous Security Scanning and Browsing
Anonymous Security Scanning and BrowsingAnonymous Security Scanning and Browsing
Anonymous Security Scanning and BrowsingAbhilash Venkata
 
TOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying MarkersTOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying MarkersBrent Muir
 
I2P (Invisible Internet Project)
I2P (Invisible Internet Project)I2P (Invisible Internet Project)
I2P (Invisible Internet Project)Shail Shah
 
Anonymizing Networks
Anonymizing NetworksAnonymizing Networks
Anonymizing Networkspauldeng
 
Onion protocol
Onion protocolOnion protocol
Onion protocolAnshu Raj
 
Onion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymityanurag singh
 
E skin.pptx
E skin.pptxE skin.pptx
E skin.pptxfoysalmd
 

Destacado (14)

I2P and the Dark Web
I2P and the Dark WebI2P and the Dark Web
I2P and the Dark Web
 
Encryption and decryption in TOR
Encryption and decryption in TOREncryption and decryption in TOR
Encryption and decryption in TOR
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using Tor
 
The End of Anonymity on Anonymous Networks
The End of Anonymity on Anonymous NetworksThe End of Anonymity on Anonymous Networks
The End of Anonymity on Anonymous Networks
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Anonymous Security Scanning and Browsing
Anonymous Security Scanning and BrowsingAnonymous Security Scanning and Browsing
Anonymous Security Scanning and Browsing
 
TOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying MarkersTOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying Markers
 
I2P (Invisible Internet Project)
I2P (Invisible Internet Project)I2P (Invisible Internet Project)
I2P (Invisible Internet Project)
 
Anonymizing Networks
Anonymizing NetworksAnonymizing Networks
Anonymizing Networks
 
Onion protocol
Onion protocolOnion protocol
Onion protocol
 
Tor Pivoting Networks Share
Tor Pivoting Networks Share Tor Pivoting Networks Share
Tor Pivoting Networks Share
 
Onion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymity
 
How TOR works?
How TOR works?How TOR works?
How TOR works?
 
E skin.pptx
E skin.pptxE skin.pptx
E skin.pptx
 

Similar a Tor network seminar by 13504

Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Marcus Leaning
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxGeetha982072
 
Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?hackdemocracy
 
Information security using onion routing(tor)
Information security using onion routing(tor)Information security using onion routing(tor)
Information security using onion routing(tor)Kaustubh Joshi
 
Demystifying Secure Channel
Demystifying Secure ChannelDemystifying Secure Channel
Demystifying Secure ChannelViral Parmar
 
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, FreenetComparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, FreenetIRJET Journal
 
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderUsing a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderRemmy Nweke, mNGE, mNUJ, mGOCOP
 
Using the Internet to hide crime
Using the Internet to hide crimeUsing the Internet to hide crime
Using the Internet to hide crimejung921
 
Obstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsObstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsDr. Prashant Vats
 
Privacy on the Internet - Init6 InfoSec August Meeting
Privacy on the Internet - Init6 InfoSec August MeetingPrivacy on the Internet - Init6 InfoSec August Meeting
Privacy on the Internet - Init6 InfoSec August MeetingJose L. Quiñones-Borrero
 
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
 Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th... Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...i_scienceEU
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The DarknetAhmed Mater
 

Similar a Tor network seminar by 13504 (20)

Anonymity Network TOR
Anonymity Network TOR Anonymity Network TOR
Anonymity Network TOR
 
Anonymous traffic network
Anonymous traffic networkAnonymous traffic network
Anonymous traffic network
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
 
.Onion
.Onion.Onion
.Onion
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Tor
TorTor
Tor
 
Tor browser
Tor browserTor browser
Tor browser
 
Dw communication
Dw communicationDw communication
Dw communication
 
Dark net
Dark netDark net
Dark net
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?
 
Information security using onion routing(tor)
Information security using onion routing(tor)Information security using onion routing(tor)
Information security using onion routing(tor)
 
Demystifying Secure Channel
Demystifying Secure ChannelDemystifying Secure Channel
Demystifying Secure Channel
 
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, FreenetComparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
 
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderUsing a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
 
Using the Internet to hide crime
Using the Internet to hide crimeUsing the Internet to hide crime
Using the Internet to hide crime
 
Obstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsObstacles to Cybercrime Investigations
Obstacles to Cybercrime Investigations
 
Privacy on the Internet - Init6 InfoSec August Meeting
Privacy on the Internet - Init6 InfoSec August MeetingPrivacy on the Internet - Init6 InfoSec August Meeting
Privacy on the Internet - Init6 InfoSec August Meeting
 
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
 Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th... Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
Runa Sandvik, The Tor Project, London: Online Anonymity: Before and After th...
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The Darknet
 

Último

Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 

Último (20)

Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 

Tor network seminar by 13504

  • 1. TOR NETWORK A Presentation by - Prashant Rana Roll No-13504 Department – cse
  • 2. Contents • Why do we need anonymity? • Introducing theTor Network • How does theTor Network work? • Hidden Services • Tor limitation • Application of anonymous system (tor) • Licit and illicit uses • Danger of using tor • Future direction • Conclusion
  • 3. Why do we need anonymity? • To hide user personal information • To hide user identity from target web site • To hide browsing pattern from employer or ISP • To conceal our internet usage from hackers • Freedom ofThought and Speech • Freedom of Social and Political Activities
  • 4. Introducing theTor Network • Tor is free software for enabling anonymous communication . • Tor aims to conceal its users' identities and their online activity from surveillance and traffic analysis by separating identification and routing. • This is done by passing the data through a circuit of at least three different routers. • The data that passes through the network is encrypted, but at the beginning and end node, there is no encryption.
  • 6. HowTorWorks? --- Onion Routing • A circuit is built incrementally one hop by one hop • Onion-like encryption • ‘Alice’ negotiates an AES key with each router • Messages are divided into equal sized cells • Each router knows only its predecessor and successor • Only the Exit router (OR3) can see the message, however it does not know where the message is from Alice Bob OR2 OR1 M √M M OR3 M C1 C2 C2 C3 C3 Port
  • 7. Cells • Onion routers communicate with one another, and with users’ OPs, via TLS connections with ephemeral keys.Traffic passes along these connections in fixed-size cells • All data is sent in fixed size (bytes) cells • Control cell commands: • Padding, create, destroy • Relay cell commands: • Begin, data, connected, teardown, ...
  • 8. HowTor Works? --- Node to Node Connection • Tor implements Perfect Forward Secrecy (PFC) by using AES encryption • In AES (Advanced Encryption Standard), a private key is generated and shared between the two users, and from this key, session keys are generated • Original keypairs are only used for signatures (i.e. to verify the authenticity of messages)
  • 10. Hidden Services • Location-hidden services allow a server to offer aTCP service without revealing its IP address. • Tor accommodates receiver anonymity by allowing location hidden services • Design goals for location hidden services • Access Control: filtering incoming requests • Robustness: maintain a long-term pseudonymous identity • Smear-resistance: against socially disapproved acts • Application transparency • Allows to access onion websites and deep web.
  • 11. TOR: Limitations • DNS Leakage : the client reveals the destination to the DNS server during DNS resolution. • End-to-end timing correlation:An attacker watching patterns of traffic at the initiator and the responder will be able to confirm the correspondence with high probability. • Eavesdropping by exit nodes:Tor does not encrypt the traffic between an exit node and the target server.Therefore a malicious exit node can observe traffic , identify user request and can send the wrong response. • Tor is slow: Traffic is bouncing through ORs and even on volunteers' computers in various parts of the world.This may cause some bottleneck and network latency.
  • 12. APPLICATIONS OF ANONYMOUS SYSTEMS (TOR) • Privacy and security for Ordinary Internet Users: it allows people to communicate with each other without necessarily revealing their personal network identification and without being tracked by others. • Censorship resistance: Tor provide a strong foundation for censorship resistance for people living under oppressive regimes that try to limit what their citizens can say and do on the Internet. • Corporate /Business : Corporate or business organizations may want to keep their data and transactions secure and secret from opponents who are regularly monitoring their activaties . Anonymous systems can then be used to achieve untracebility .
  • 13. Licit and illicit uses • Tor is increasingly in common use by victims of domestic violence and the social workers and agencies which assist them • A growing list of news organizations are using the SecureDrop software platform to accept material for publication in a manner intended to protect the anonymity of sources. • It is endorsed by civil liberties groups as a method for whistleblowers and human rights workers to communicate with journalists
  • 14. Licit and illicit uses (Contd.) • Tor is used for matters that are, or may be, illegal in some countries, e.g., to gain access to censored information, to organize political activities, or to circumvent laws against criticism of heads of state. • Tor can be used for anonymous defamation, unauthorized leaks of sensitive information and copyright infringement, distribution of illegal sexual content, selling controlled substances, money laundering, credit card fraud, and identity theft. • Ironically,Tor has been used by criminal enterprises, hacktivism groups, and law enforcement agencies at cross purposes, sometimes simultaneously
  • 15. Dangers of usingTor Network • "The more you hide the more somebody wants to know why.“ • While the inter-relay communications might be secure, the entry and exit nodes are vulnerable to packet sniffing and • The exit node decrypts the packet it received from its sibling on the chain of nodes and receives your full plaintext request.This can be easily seen by the operator of the exit node. • Running an exit node is dangerous as all exit traffic, legal and illegal, will be traced to your IP • Anyone usingTOR network is on the NSA watch list under the Xkeyscore program.
  • 17. CONCLUSION • Researches in the last 30 years has made significant progress towards enabling private and anonymous communication on the Internet. With an increasing level of public awareness about threats to personal privacy, such as identity theft or online advertisers tracking user behavior, academic and public interest in anonymous communication systems is likely to continue to increase in the near future.As a result public and academic interest in improving existing systems for anonymity is also increasing.This may enable and encourage future global network design to include privacy and anonymity as fundamental property.
  • 18. References • https://www.torproject.org/ • https://en.wikipedia.org/wiki/Tor_(anonymity_network) • McCoy, Damon; Bauer, Kevin; Grunwald, Dirk; Kohno,Tadayoshi; Sicker, Douglas (2008)."Shining Light in Dark Places: Understanding theTor Network". Proceedings of the 8th International Symposium on Privacy EnhancingTechnologies. 8th International Symposium on Privacy EnhancingTechnologies. Berlin, Germany: Springer-Verlag. pp. 63–76. • "Tor Project Form 990 2008". Tor Project.Tor Project. 2009. Retrieved 30August 2014. • "Tor Project Form 990 2007". Tor Project.Tor Project. 2008. Retrieved 30 August 2014. • "Tor Project Form 990 2009". Tor Project.Tor Project. 2010. Retrieved 30 August 2014. • Samson,Ted (5 August 2013). "Tor Browser Bundle forWindows users susceptible to info- stealing attack". InfoWorld. • Dingledine, Roger (7 April 2014). "OpenSSL bug CVE-2014-0160". Tor Project. • Le Blond, Stevens; Manils, Pere; Chaabane, Abdelberi; Ali Kaafar, Mohamed; Castelluccia, Claude; Legout, Arnaud; Dabbous,Walid (March 2011). "One Bad Apple Spoils the Bunch: Exploiting P2P Applications toTrace and ProfileTor Users". 4th USENIX Workshop on Large- Scale Exploits and EmergentThreats (LEET '11). National Institute for Research in Computer Science and Control.
  • 19. Q&A