[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Sangeetha et al., 2015 - Google Patents

A novel traffic dividing and scheduling mechanism for enhancing security and performance in the tor network

Sangeetha et al., 2015

View PDF
Document ID
2569739338720671899
Author
Sangeetha K
Ravikumar K
Publication year
Publication venue
Indian Journal of Science and Technology

External Links

Snippet

Objective: The main intent of this research is to improve the quality-of-service in the Tor anonymous communication network by splitting the traffic and scheduling it according to the traffic load. Methods: In this manuscript, a Novel Traffic, Dividing and Scheduling (NTDS) …
Continue reading at sciresol.s3.us-east-2.amazonaws.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/56Packet switching systems
    • H04L12/5601Transfer mode dependent, e.g. ATM
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/26Monitoring arrangements; Testing arrangements
    • H04L12/2602Monitoring arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic regulation in packet switching networks
    • H04L47/10Flow control or congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing packet switching networks
    • H04L43/08Monitoring based on specific metrics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. local area networks [LAN], wide area networks [WAN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Application independent communication protocol aspects or techniques in packet data networks

Similar Documents

Publication Publication Date Title
AlSabah et al. The path less travelled: Overcoming Tor’s bottlenecks with traffic splitting
Mittal et al. Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting
Wolinsky et al. Dissent in numbers: Making strong anonymity scale
Zhao et al. SDN‐Based Double Hopping Communication against Sniffer Attack
Han et al. Rumor riding: Anonymizing unstructured peer-to-peer systems
Liu et al. Rumor riding: Anonymizing unstructured peer-to-peer systems
Rauf et al. Formal approach for resilient reachability based on end-system route agility
Sangeetha et al. A novel traffic dividing and scheduling mechanism for enhancing security and performance in the tor network
Lin et al. Scalable and anonymous group communication with MTor
Tatlicioglu et al. A security services platform for Software Defined Networks
Balakrishnan et al. Team: Trust enhanced security architecture for mobile ad-hoc networks
Patil et al. Secure, reliable and load balanced routing protocols for multihop wireless networks
Saharan et al. Prevention of DrDoS amplification attacks by penalizing the attackers in SDN environment
El Mougy et al. Preserving privacy in wireless sensor networks using onion routing
Borges et al. PoT-PolKA: Let the Edge Control the Proof-of-Transit in Path-Aware Networks
Bu et al. A survivable DoS-resistant overlay network
Goldberg et al. Path-quality monitoring in the presence of adversaries: The secure sketch protocols
Borges et al. In-situ proof-of-transit for path-aware programmable networks
Ghaderi et al. On Randomization in MTD Systems
Zhu et al. MIC: An efficient anonymous communication system in data center networks
Wójcik et al. Loop resolution mechanism for flow-aware multi-topology adaptive routing
Filipek et al. Security architecture for the mobile ad hoc networks
Zhou et al. Multi-variant network address hopping to defend stealthy crossfire attack
Lin et al. The implementation of multi-path delivery for data flows using Raspberry Pi boards in software-defined networks
Garg Performance analysis of AODV and TORA under DDoS attack in MANETs