A Systematic Way to Implement Private Tor Network with Trusted Middle Node
Title | A Systematic Way to Implement Private Tor Network with Trusted Middle Node |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Mane, Y. D., Khot, U. P. |
Conference Name | 2020 International Conference for Emerging Technology (INCET) |
Date Published | jun |
Keywords | browser security, Browsers, Central Processing Unit, compositionality, CPU Percentage, CpuCount, cryptography, Free CPU Time, Human Behavior, IP networks, Live Tor Network (LTN), Metrics, Physical Free Memory, Private Tor Network (PTN), pubcrawl, Random access memory, resilience, Resiliency, Servers, sockets, Trust, Trusted Middle Node, trustworthiness, Web Browser Security |
Abstract | Initially, legitimate users were working under a normal web browser to do all activities over the internet [1]. To get more secure service and to get protection against Bot activity, the legitimate users switched their activity from Normal web browser to low latency anonymous communication such as Tor Browser. The Traffic monitoring in Tor Network is difficult as the packets are traveling from source to destination in an encrypted fashion and the Tor network hides its identity from destination. But lately, even the illegitimate users such as attackers/criminals started their activity on the Tor browser. The secured Tor network makes the detection of Botnet more difficult. The existing tools for botnet detection became inefficient against Tor-based bots because of the features of the Tor browser. As the Tor Browser is highly secure and because of the ethical issues, doing practical experiments on it is not advisable which could affect the performance and functionality of the Tor browser. It may also affect the endanger users in situations where the failure of Tor's anonymity has severe consequences. So, in the proposed research work, Private Tor Networks (PTN) on physical or virtual machines with dedicated resources have been created along with Trusted Middle Node. The motivation behind the trusted middle node is to make the Private Tor network more efficient and to increase its performance. |
DOI | 10.1109/INCET49848.2020.9154076 |
Citation Key | mane_systematic_2020 |
- Metrics
- trustworthiness
- Trusted Middle Node
- trust
- sockets
- Servers
- Resiliency
- resilience
- Random access memory
- pubcrawl
- Private Tor Network (PTN)
- Physical Free Memory
- Web Browser Security
- Live Tor Network (LTN)
- IP networks
- Human behavior
- Free CPU Time
- Cryptography
- CpuCount
- CPU Percentage
- Compositionality
- Central Processing Unit
- Browsers
- Browser Security