Abstract
Recently, studies on the Mixed Networking which guarantees the anonymity in Internet environment are actively carried. Since this technology uses the coded communication and its communication paths are changed frequently, it is difficult to detect attacks of the hackers. In this situation, if the cyber-attack occurs between countries, there shall be a high potential for the hackers to use the anonymous network technology in order to hide themselves. Anyway, the anonymous network technology is continuously being updated by the hackers and a new technology is under development. Thus, this paper verified statistically the attacking methods which the hackers shall create by increasing the data transmission rate of TOR through manipulating the speed of the anonymous network, and proposed political countermeasures to detect hacker’s attacks effectively which use this technology.
Similar content being viewed by others
References
Bauer K et al (2007) Low-resource routing attacks against tor. WPES, New York, pp 11–20
Invisible Internet Project, http://www.i2p2.de
Jeong Wook Kim et al., “The effective monitoring and controlling method through malicious domain-IP traceback, Jouranl of Information and Security, 2009. 3
K.W.J. et al., “Egregious use of Tor servers?”, RechtenForum, 2007
Martin Suess, “Breaking TOR Anonymity”, http://www.csnc.ch/misc/files/publications/the_onion_router_v1.1.pdf, 2008
Mike Perry, “TorFlow, tor network analysis”, In HotPETs 2009, page 14, 2009
Steven J. Murdoch, “Tor: anonymous internet communication system”, University of Cambridge, Computer Laboratory, 2006
Steven J. Murdoch et al., “Low-cost traffic analysis of Tor”, IEEE Symposium on security and privacy, 2007
Timothy G. et al., “Browser-Based Attacks on Tor”, http://web.mit.edu/tabbott/www/papers/tor.pdf, 2007
Tor (anonymity network), http://en.wikipedia.org/wiki/Tor_(anonymity_network)
Tor Network Status, http://torstatus.blutmagie.de
Tor project, http://www.torproject.org
TorStatus, http://torstatus.kgprog.com
Author information
Authors and Affiliations
Corresponding authors
Rights and permissions
About this article
Cite this article
Park, K.C., Shin, H., Park, W.H. et al. New detection method and countermeasure of cyber attacks in mix networks. Multimed Tools Appl 74, 6509–6518 (2015). https://doi.org/10.1007/s11042-014-2127-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-014-2127-7