Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/332357
Title: Traffic analysis using correlation based attacks based on anonymity
Researcher: Balasubramanian, K
Guide(s): Kannan, S
Keywords: Engineering and Technology
Computer Science
Computer Science Information Systems
Traffic
Correlation
Anonymity
University: Anna University
Completed Date: 2021
Abstract: Today s technological world, the network interaction is increased with various applications. The most widely used internet access is the major thing to communicate, share and transfer, privacy, security etc. Here the internet communication is efficiently possible with the anonymous network systems. This anonymity system is widely spread applications for security, privacy, and efficient communications at internet. This system is applicable for peer-to-peer communication, electronic voting, web browsing, e-mails, and e-commerce. To identify the authority of the data, the encryption and decryption process is used in this anonymity system. In an existing system, the blend system is employed to model the network and it is not exactly providing the node status to the network communicator since the network recognizing rate is poor. By analyzing with various techniques in blends, the clustering model is employed to detect the node for analysing the network traffic. Here the clumping process is used to hinder against the attacks in the overlay network. The traffic analysis of anonymity network is modelled with flow based correlation method; here the network attack is reduced by using various techniques. In this proposed system, the attacks presented in the anonymity network model are analyzed and the correlation-based model is employed to identify the detection rate of the network error. The traffic analysis of the anonymity system is measured based on the internal layers of the network. While transmitting or receiving the data, the traffic is occurred in the network node since the traffic rate of the network node is analyzed in this system. Mix network model is employed to identify the efficient anonymity network to perform the user request. newline
Pagination: xv,146 p.
URI: http://hdl.handle.net/10603/332357
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File29.2 kBAdobe PDFView/Open
02_certificates.pdf169.55 kBAdobe PDFView/Open
03_vivaproceedings.pdf262.59 kBAdobe PDFView/Open
04_bonafidecertificate.pdf187.23 kBAdobe PDFView/Open
05_abstracts.pdf131.11 kBAdobe PDFView/Open
06_acknowledgements.pdf173.86 kBAdobe PDFView/Open
07_contents.pdf20.06 kBAdobe PDFView/Open
08_listoftables.pdf8.53 kBAdobe PDFView/Open
09_listoffigures.pdf171.87 kBAdobe PDFView/Open
10_listofabbreviations.pdf18.44 kBAdobe PDFView/Open
11_chapter1.pdf458.86 kBAdobe PDFView/Open
12_chapter2.pdf268.3 kBAdobe PDFView/Open
13_chapter3.pdf611.41 kBAdobe PDFView/Open
14_chapter4.pdf349.21 kBAdobe PDFView/Open
15_chapter5.pdf394.9 kBAdobe PDFView/Open
16_conclusion.pdf21.44 kBAdobe PDFView/Open
17_references.pdf198.03 kBAdobe PDFView/Open
18_listofpublications.pdf128.67 kBAdobe PDFView/Open
80_recommendation.pdf53.23 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: