{"title":"Anonymized searches and their tracing","authors":"Dayanand, Mohini Chauhan","doi":"10.1109/ICICT46931.2019.8977636","DOIUrl":null,"url":null,"abstract":"Tor protects against a common form of Internet monitoring known as \"traffic analysis\". Traffic analysis can be used to find out who is being talked to on a public network. Knowing the source and destination of your Internet traffic allows others to track your behavior and interests. This can affect your check book, for example, an e-commerce site uses price discrimination based on your country or origin. It even reveals who and where you are. For example, if you are traveling abroad and you connect to your[1] employer's computer to check or send mails, you inadvertently send your national origin and professional affiliation to someone observing the network Can appear, even if the connection is encrypted. This paper will discuss how network traffic will be clear and transparent. People using tools such as ToR can now be easily tracked and therefore the organization can easily filter malicious content from the entire stack of networks. Using specific algorithms and its associated code, the tool will also simplify filtering traffic based on certain categories and, after operating some pre-defined algorithms, traffic will also be analyzed.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICT46931.2019.8977636","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Tor protects against a common form of Internet monitoring known as "traffic analysis". Traffic analysis can be used to find out who is being talked to on a public network. Knowing the source and destination of your Internet traffic allows others to track your behavior and interests. This can affect your check book, for example, an e-commerce site uses price discrimination based on your country or origin. It even reveals who and where you are. For example, if you are traveling abroad and you connect to your[1] employer's computer to check or send mails, you inadvertently send your national origin and professional affiliation to someone observing the network Can appear, even if the connection is encrypted. This paper will discuss how network traffic will be clear and transparent. People using tools such as ToR can now be easily tracked and therefore the organization can easily filter malicious content from the entire stack of networks. Using specific algorithms and its associated code, the tool will also simplify filtering traffic based on certain categories and, after operating some pre-defined algorithms, traffic will also be analyzed.