Loading

Attack against Anonymous Network
Akshatha Prabhu K
Akshatha Prabhu K, received B.E degree in Information Science From VTU in 2010, Persuing MTECH degree in Computer Science and Engineering from VTU. Served as Lecturer under VTU from 2010 to 2012.
Manuscript received on April 05, 2014. | Revised Manuscript received on April 11, 2014. | Manuscript published on April 15, 2014. | PP: 33-36 | Volume-2 Issue-5, April 2014. | Retrieval Number: E0645042514/2014©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: This paper focuses on the active watermarking technique, which has been active in the past few years. This paper proposes a flow-marking scheme based on the direct sequence spread spectrum technique by utilizing a pseudo-noise code. By interfering with the rate of a suspect sender’s traffic and marginally changing the traffic rate, the attacker can embed a secret spread-spectrum signal into the target traffic. The embedded signal is carried along with the target traffic from the sender to the receiver, so the investigator can recognize the corresponding communication relationship, tracing the messages despite the use of anonymous networks. However, in order to accurately confirm the anonymous communication relationship of users, the flow-marking scheme needs to embed a signal modulated by a relatively long length of PN code, and also the signal is embedded into the traffic flow rate variation. After the signal is embedded and delay is added between cells, we gone generate Mimo graph, it gives the probability of how much data is been extracted.
Keywords: Attack against TOR.