Abstract
Recently, studies on the Mixed Networking which guarantees the anonymity in Internet environment are actively carried. Since this technology uses the coded communication and its communication paths are changed frequently, it is difficult to detect attacks of the hackers. In this situation, if the cyber-attack occurs between countries, there shall be a high potential for the hackers to use the anonymous network technology in order to hide themselves. Anyway, the anonymous network technology is continuously being updated by the hackers and a new technology is under development. Thus, this paper verified statistically the attacking methods which the hackers shall create by increasing the data transmission rate of TOR through manipulating the speed of the anonymous network, and proposed political countermeasures to detect hacker’s attacks effectively which use this technology.
Original language | English |
---|---|
Pages (from-to) | 6509-6518 |
Number of pages | 10 |
Journal | Multimedia Tools and Applications |
Volume | 74 |
Issue number | 16 |
DOIs | |
Publication status | Published - 2014 Jun 27 |
Keywords
- Blacklist IP
- Cyber attack
- Ext node
- Mix networks
- TOR
ASJC Scopus subject areas
- Media Technology
- Hardware and Architecture
- Computer Networks and Communications
- Software