Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/332357
Title: | Traffic analysis using correlation based attacks based on anonymity |
Researcher: | Balasubramanian, K |
Guide(s): | Kannan, S |
Keywords: | Engineering and Technology Computer Science Computer Science Information Systems Traffic Correlation Anonymity |
University: | Anna University |
Completed Date: | 2021 |
Abstract: | Today s technological world, the network interaction is increased with various applications. The most widely used internet access is the major thing to communicate, share and transfer, privacy, security etc. Here the internet communication is efficiently possible with the anonymous network systems. This anonymity system is widely spread applications for security, privacy, and efficient communications at internet. This system is applicable for peer-to-peer communication, electronic voting, web browsing, e-mails, and e-commerce. To identify the authority of the data, the encryption and decryption process is used in this anonymity system. In an existing system, the blend system is employed to model the network and it is not exactly providing the node status to the network communicator since the network recognizing rate is poor. By analyzing with various techniques in blends, the clustering model is employed to detect the node for analysing the network traffic. Here the clumping process is used to hinder against the attacks in the overlay network. The traffic analysis of anonymity network is modelled with flow based correlation method; here the network attack is reduced by using various techniques. In this proposed system, the attacks presented in the anonymity network model are analyzed and the correlation-based model is employed to identify the detection rate of the network error. The traffic analysis of the anonymity system is measured based on the internal layers of the network. While transmitting or receiving the data, the traffic is occurred in the network node since the traffic rate of the network node is analyzed in this system. Mix network model is employed to identify the efficient anonymity network to perform the user request. newline |
Pagination: | xv,146 p. |
URI: | http://hdl.handle.net/10603/332357 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 29.2 kB | Adobe PDF | View/Open |
02_certificates.pdf | 169.55 kB | Adobe PDF | View/Open | |
03_vivaproceedings.pdf | 262.59 kB | Adobe PDF | View/Open | |
04_bonafidecertificate.pdf | 187.23 kB | Adobe PDF | View/Open | |
05_abstracts.pdf | 131.11 kB | Adobe PDF | View/Open | |
06_acknowledgements.pdf | 173.86 kB | Adobe PDF | View/Open | |
07_contents.pdf | 20.06 kB | Adobe PDF | View/Open | |
08_listoftables.pdf | 8.53 kB | Adobe PDF | View/Open | |
09_listoffigures.pdf | 171.87 kB | Adobe PDF | View/Open | |
10_listofabbreviations.pdf | 18.44 kB | Adobe PDF | View/Open | |
11_chapter1.pdf | 458.86 kB | Adobe PDF | View/Open | |
12_chapter2.pdf | 268.3 kB | Adobe PDF | View/Open | |
13_chapter3.pdf | 611.41 kB | Adobe PDF | View/Open | |
14_chapter4.pdf | 349.21 kB | Adobe PDF | View/Open | |
15_chapter5.pdf | 394.9 kB | Adobe PDF | View/Open | |
16_conclusion.pdf | 21.44 kB | Adobe PDF | View/Open | |
17_references.pdf | 198.03 kB | Adobe PDF | View/Open | |
18_listofpublications.pdf | 128.67 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 53.23 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: