Skip to main content
Log in

New detection method and countermeasure of cyber attacks in mix networks

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Recently, studies on the Mixed Networking which guarantees the anonymity in Internet environment are actively carried. Since this technology uses the coded communication and its communication paths are changed frequently, it is difficult to detect attacks of the hackers. In this situation, if the cyber-attack occurs between countries, there shall be a high potential for the hackers to use the anonymous network technology in order to hide themselves. Anyway, the anonymous network technology is continuously being updated by the hackers and a new technology is under development. Thus, this paper verified statistically the attacking methods which the hackers shall create by increasing the data transmission rate of TOR through manipulating the speed of the anonymous network, and proposed political countermeasures to detect hacker’s attacks effectively which use this technology.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Bauer K et al (2007) Low-resource routing attacks against tor. WPES, New York, pp 11–20

    Google Scholar 

  2. Invisible Internet Project, http://www.i2p2.de

  3. Jeong Wook Kim et al., “The effective monitoring and controlling method through malicious domain-IP traceback, Jouranl of Information and Security, 2009. 3

  4. K.W.J. et al., “Egregious use of Tor servers?”, RechtenForum, 2007

  5. Martin Suess, “Breaking TOR Anonymity”, http://www.csnc.ch/misc/files/publications/the_onion_router_v1.1.pdf, 2008

  6. Mike Perry, “TorFlow, tor network analysis”, In HotPETs 2009, page 14, 2009

  7. Steven J. Murdoch, “Tor: anonymous internet communication system”, University of Cambridge, Computer Laboratory, 2006

  8. Steven J. Murdoch et al., “Low-cost traffic analysis of Tor”, IEEE Symposium on security and privacy, 2007

  9. Timothy G. et al., “Browser-Based Attacks on Tor”, http://web.mit.edu/tabbott/www/papers/tor.pdf, 2007

  10. Tor (anonymity network), http://en.wikipedia.org/wiki/Tor_(anonymity_network)

  11. Tor Network Status, http://torstatus.blutmagie.de

  12. Tor project, http://www.torproject.org

  13. TorStatus, http://torstatus.kgprog.com

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Kwang Cheol Park or Won Hyung Park.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Park, K.C., Shin, H., Park, W.H. et al. New detection method and countermeasure of cyber attacks in mix networks. Multimed Tools Appl 74, 6509–6518 (2015). https://doi.org/10.1007/s11042-014-2127-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-014-2127-7

Keywords

Navigation