logo

(Sample) The Onion Routing

   

Added on  2021-04-16

6 Pages1617 Words106 Views
Running head: ONION ROUTINGONION ROUTINGName of studentName of UniversityAuthor Note
(Sample) The Onion Routing_1
1ONION ROUTINGHow the chosen class, technique, or application worksOnion routing is defined as a method of communication anonymously i.e withoutrevealing the users’ identity over a computer network. In this type of network the messageswhich are sent and received stays encrypted. The encrypted messages or other data is transferredthrough various nodes of a network which are known as onion routers (Chen et al., 2015). Onionrouters communicate among themselves over Transmission control protocol(Sakai et al., 2016,).The process of onion routing is based on the technique of hiding the source i.e sender of data ormessage of a packet data instead of the content of data from the network tracking authorities (eg.Government or security agencies). Onion routing therefore protects data from the network trafficanalysis type of attack on the encrypted data. There are some routers which serve as entryfunnels and some are as exit funnels. The process of onion routing is based on the usage ofpublic key cryptography which is a technique that encrypts each and every layer of onion andallows only the intended receiver of data to decrypt it.How the onion routing has been used by Internet users for legitimate purposesThe onion routing is used for the anonymous communication by the users where theinformation sent over the network stays hidden and the senders’ identity also stays covered. Thesecurity agencies and defence forces use this technique for communication to keep sensible datasafe and secured from tracing the sender and receiver(Zhou et al., 2013). NSA uses vulnerabilityof TOR to track illegal activities done in deep or dark web. Internet users has been using onionrouting to send sensible data such as banking details and passwords to specific receiver over thenetwork. Important details related to research and findings are sent via onion routers to safeguardthem from the hackers and network observers. The educational institutes use this for publicationof results and question papers to prevent them from leaking.
(Sample) The Onion Routing_2
2ONION ROUTINGHow the onion routing class, technique, or application has been used by cybercriminals(illegitimate purposes).The onion routing method has been widely used by the criminals to stay anonymous andcarry on illegitimate activities of sending data to stay hidden from government and securityagencies. The trading of crypto currencies and other communications related to monetary fraud isdone using onion routing technique by the fraudsters. The terrorists use this to conduct terrorismrelated crimes by communicating internationally. The traffic analysis is used by the hackers tointerrupt the message when it travels through a network to steal information of users. Thecybercriminals can hack the exit note and get the raw data transferred over the network. It is amajor vulnerability of TOR which is often used by the hackers(Doshi and Jinwala 2013). Thecybercriminals use this for communication among themselves and exchange of information.Critical evaluation of measures that can be adopted against the chosen anonymoustechnology used by cybercriminals.The process of onion routing can be cracked by the technique called timing analysis. Inonion routing the sender’s identity is not revealed because if an intermediate router is hacked itwill only reveal about the immediate routers but not the original sender(Biondi et al., 2013). Theconventional internet service is vulnerable because the internet service provider can trace theconnections of two users but in onion routing an obscure path is created between the twocomputers in such a way that there is no direct connection between the user and a website butthere are many lines of communication or connections between the computers of the network.The process of traffic analysis can track the messages transmitted over the network by onionrouting. Traffic analysis method is an onion routing decryption process which searches those
(Sample) The Onion Routing_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Processing of Onion Router
|7
|1051
|57

CO4515 - Trends in Cybercrime
|10
|2226
|183

Analysis on Computer Science 2022
|23
|6035
|435

Trends in Cyber Crime
|9
|2268
|192

Man-in-the-Middle Attack | Essay
|10
|2978
|26

Types of Computer Security Techniques
|14
|4116
|383