Visible to the public A Systematic Way to Implement Private Tor Network with Trusted Middle Node

TitleA Systematic Way to Implement Private Tor Network with Trusted Middle Node
Publication TypeConference Paper
Year of Publication2020
AuthorsMane, Y. D., Khot, U. P.
Conference Name2020 International Conference for Emerging Technology (INCET)
Date Publishedjun
Keywordsbrowser security, Browsers, Central Processing Unit, compositionality, CPU Percentage, CpuCount, cryptography, Free CPU Time, Human Behavior, IP networks, Live Tor Network (LTN), Metrics, Physical Free Memory, Private Tor Network (PTN), pubcrawl, Random access memory, resilience, Resiliency, Servers, sockets, Trust, Trusted Middle Node, trustworthiness, Web Browser Security
Abstract

Initially, legitimate users were working under a normal web browser to do all activities over the internet [1]. To get more secure service and to get protection against Bot activity, the legitimate users switched their activity from Normal web browser to low latency anonymous communication such as Tor Browser. The Traffic monitoring in Tor Network is difficult as the packets are traveling from source to destination in an encrypted fashion and the Tor network hides its identity from destination. But lately, even the illegitimate users such as attackers/criminals started their activity on the Tor browser. The secured Tor network makes the detection of Botnet more difficult. The existing tools for botnet detection became inefficient against Tor-based bots because of the features of the Tor browser. As the Tor Browser is highly secure and because of the ethical issues, doing practical experiments on it is not advisable which could affect the performance and functionality of the Tor browser. It may also affect the endanger users in situations where the failure of Tor's anonymity has severe consequences. So, in the proposed research work, Private Tor Networks (PTN) on physical or virtual machines with dedicated resources have been created along with Trusted Middle Node. The motivation behind the trusted middle node is to make the Private Tor network more efficient and to increase its performance.

DOI10.1109/INCET49848.2020.9154076
Citation Keymane_systematic_2020