logo

Analysis on Computer Science 2022

   

Added on  2022-10-01

23 Pages6035 Words435 Views
Running Head: COMPUTER SCIENCE 1
Computer Science
Name
School Affiliation
Analysis on Computer Science 2022_1
COMPUTER SCIENCE 2
CHAPTER 1
INTRODUCTION
1.1. Background
TOR browser stands for The Onion Router which was started in the 1990’s by a group of
people at U.S Naval Research Lab (NRL). The increased insecurity and the ability to monitor
and traffic analysis brought a great concern. Mathematician Paul Syverson and computer
scientists Mike Reed and David Goldschlag saw that there was a need to develop more secure
internet connection that does not give information of who is communicating to whom even to
someone keeping track of the network. Their intention was to create and develop a unique design
and prototypes of onion routing (Gallagher, K., Patil, S., Dolan-Gavitt, B., McCoy, D., & Memon, N.,
2018, October).
The aim of onion routing was to enable internet user to surf the internet with as much
privacy as it is practically possible, through routing traffic by using multiple servers and
encrypting. Onion routing manifested through encryption in the application layer of the
communication protocol. TOR encrypt and decrypt data sent through a virtual circuit by not
revealing the next destination IP address.
TOR has several features, which includes,
The ability to block trackers. This features protects the internet browsers from the third parties
and being followed by ads while browsing.
It enables free browsing. A person using TOR browser has an advantage over other browsers
because TOR gives access to sites that are blocked by the other browsers.
Analysis on Computer Science 2022_2
COMPUTER SCIENCE 3
Resist fingerprinting. TOR ensure that all people using the internet look the same. This makes it
very hard to pick point a particular browser.
Its capability to hide IP source
Portability. You can use a pre-configured browser using a USB device storage without
necessarily installing it in your device.
Has multilayered encryption. Traffic is relayed and encrypted 3 times through TOR relays.
It defends against surveillance. This means that can’t know what you browse and what website
you visit.
Research Question:
What would will be the demographic of sales and product?
Due to TOR features it has led to emergency of several market places such as Alpha Bay,
Outlaw Market and Dream Market. In these markets all sorts of products be it legal or illegal are
sold. Dream Market for example is an online dark net market which was founded in 2013 which
depends on hidden services of TOR to run. This market place is popular because it sells a variety
of products which includes, fake consumer goods, stolen data, coins laundry, digital goods and
drugs through crypto coins. Due to shutdown of AlphaBay and Hansa market, people thought
that Dream market would be the prevalent darknet market place. As a result of the seizure of
AlphaBAy and Hansa market Dream market gained popularity and became the second largest
marketplace (Mackey, T., Kalyanam, J., Klugman, J., Kuzmenko, E., & Gupta, R., 2018). This led to
many buyers and sellers from AlphaBay and Hansa to register on Dream market.
Analysis on Computer Science 2022_3
COMPUTER SCIENCE 4
Anybody can access Dream market regardless of their age, level of income, education, location,
gender and race. This will mean that Dream market will reach out to all customers and satisfy
their needs accordingly.
- What contribute to work trustworthiness of vendor?
The creation of escrow technologies which provides protection against scams by having a
third party that is entrusted with the money until the buyer and seller certify the products have
been successfully delivered.
Reduction of intermarket competition which makes Dream Market to focus on their own
market by improving their security so as to prevent them from hackers, message encryption and
two-factor authentication.
Another way that contributes to work trustworthiness of a vendor is by checking on the
rating and feedback given by other customers. Costumers will tend to go for a vendor who has
high rating and positive feedback and comments given from previous transactions.
Which is the optimal data mining technique and ensemble method to evaluate the result?
Among the various data mining techniques, the most applicable methods in this research will be
classification which will involve grouping of various products.
Analysis on Computer Science 2022_4
COMPUTER SCIENCE 5
1.2. Problem Statement
Too much data,
TOR browser will tend to attract a lot of people, both buyers and sellers in the markets
taking advantage of the fact that no one can track them down or find out what they are doing.
This will mean that there will be too much information found here. Vendors both scams and
trustworthy will describe their variety of products during marketing, this gives the buyers a hard
time finding what they want. This is a major problem even for researchers who may be trying to
track down someone too much data will make it hard to concentrate on the major course of the
study.
Take time to clean all unnecessary data
TOR browser is a heavily encrypted site which involves a lot of security questions and
steps for anyone to register. For example, if a client is registering for the first time in the web
they may give information which isn’t needed. It very hard to distinguish what information is
more useful and which is not. In case one is not careful enough they might be a great data lose
which may take long time to recover. In formation in this web browser is of great importance and
one should be very vigilant while cleaning unwanted data. TOR browser is heavily concealing
web using programming languages and codes.
It take time to encrypt sent messages and distinguish which message is no longer in use.
After the information is decrypted, you have to go through security steps to verify that you are
the owner of the account which may be hard. Hacker and other unauthorized people may take
this chance to exploit sensitive data.
Analysis on Computer Science 2022_5
COMPUTER SCIENCE 6
Just like any other system TOR has its own weakness, first users are constantly hacked
probably because the user’s device are not well protected. Also, one can still be tracked online
even when using tor browser because of poor exist nodes of your destination.
1.3. Objectives of the Research
Data processing. The main concept of data processing is sorting, storing and retrieval
of data at short intervals. Through methods such as collecting, organizing, sorting, modifying,
publishing and destroying data. Objects of data processing includes.
To provide qualitative and quantitative information. This will help give qualitative and
qualitative information about each product that has been identified. This will come in handy
when it comes to grouping and sorting the products according to their characteristics.
To provide proper and timely information. Different kind of information will be needed in
every step of the way. Data processing will provide the most correct and timely information
where necessary.
Storage and retrieval of data. Through various methods of data processing, stored data
can be when necessary as it is required.
Uphold research performance at optimum level. Well organized data will ensure that the
research goes on well with minimum difficulties in handling data. This is because well-organized
data will provide a smooth flow of various operations at different stages of the research thus
there will be no or minimum time wastage.
Helps in decision making. When effective data processing method is used, it will be very
easy in decision making since good information is provided before any action is taken. In this
Analysis on Computer Science 2022_6

End of preview

Want to access all the pages? Upload your documents or become a member.