By: Conor Doherty and Kenneth Cabrera

Slides:



Advertisements
Similar presentations
DARKNET.
Advertisements

Guide to Computer Forensics and Investigations1 Network Forensics Overview Network forensics –Systematic tracking of incoming and outgoing traffic To ascertain.
Dark net . . Invisible Web . . Hidden Web . .
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
Introducing K12Planet.com What is K12Planet.com? Who can access it? Is it secure? What do I need to use it? Can I control the information I see?
Onion Routing Security Analysis Aaron Johnson U.S. Naval Research Laboratory DC-Area Anonymity, Privacy, and Security Seminar.
Privacy Protection In Grid Computing System Presented by Jiaying Shi.
Anonymity on the Internet Jess Wilson. Anonymizing Proxy What is a proxy? – An intermediary between you and the internet How does it make you anonymous?
ToR. Tor: anonymity online Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet.
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
Privacy on the Web Gertzman Lora Krakov Lena. Why privacy? Privacy is the number one consumer issue facing the internet. An eavesdropper (server, service.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Anonymizing Network Technologies Some slides modified from Dingledine, Mathewson, Syverson, Xinwen Fu, and Yinglin Sun Presenter: Chris Zachor 03/23/2011.
The Anonymous File Transfer Network
Tor (Anonymity Network) Scott Pardue. Tor Network  Nodes with routers within the network (entry, middle, exit)  Directory servers  Socket Secure (SOCKS)
Sofya Rozenblat 11/26/2012 CS 105 TOR ANONYMITY NETWORK.
Project Overview Flying Freedom Per Heselius & Martin Hedenfalk.
© Copyright 2012 STI INNSBRUCK Tor project: Anonymity online.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Lecture 29 Page 1 Advanced Network Security Privacy in Networking Advanced Network Security Peter Reiher August, 2014.
1 Anonshare 2.0 P2P Anonymous Browsing History Share Frank Chiang Terry Go Rui Ma Anita Mathew.
Anonymity and the Internet Nathan Owens. Overview Regular Internet anonymity Non-standard implementations Benefits Negatives Legal changes Future Ideas.
CSE 486/586, Spring 2012 CSE 486/586 Distributed Systems Case Study: TOR Anonymity Network Bahadir Ismail Aydin Computer Sciences and Engineering University.
Meng Yan. Introduction In fact, your online actions may be monitored by unauthorized parties logged and preserved for future access years later.
METADATA: TRACKING AND ENCRYPTION. METADATA EXAMPLES Microsoft Word document properties Telephone/ metadata Camera/image metadata Web browser identification.
TCP/IP Model & How it Relates to Browsing the Internet Anonymously BY: HELEN LIN.
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
The Silk Road: An Online Marketplace
The Tor Network BY: CONOR DOHERTY AND KENNETH CABRERA.
Supplemental Information on TOR (The Onion Router) CEH ed 8, Rev 4 CS3695 – Network Vulnerability Assessment & Risk Mitigation–
Nathaniel Ley CIS235 Dec. 09, Why do we need Tor?  Encryption is not enough to ensure complete anonymity, since packet headers can still reveal.
Lecture 17 Page 1 CS 236 Online Onion Routing Meant to handle issue of people knowing who you’re talking to Basic idea is to conceal sources and destinations.
Traffic Correlation in Tor Source and Destination Prediction PETER BYERLEY RINDAL SULTAN ALANAZI HAFED ALGHAMDI.
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
Can SSL and TOR be intercepted? Secure Socket Layer.
#ABATECHSHOW PRESENTED BY: The Deep Dark Web Presenters John Simek #Idon’tTweet Amanda
ANONYMIZING / WEB PRIVACY. TOOLS: STAYING ANONYMOUS ON THE INTERNET Proxy Server Tor.
Hiding in the Dark: The Internet You Cannot See Marc Visnick
Topic : Privacy and Anonymity. Definition Privacy is the ability of individuals and groups to determine for themselves when, how and to what extent information.
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
Hotspot Shield Protect Your Online Identity
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
Tor Good + Evil.
Deep and Dark on the Web By: Todd Careless.
Tor Internals and Hidden Services
Dark Web – the modern threat for the Internet Security
Wireless Network Security
Using a Computer Network
IbVPN: Ensures Your Online Safety and Access Blocked Websites
How And The Internet Work
Digital Forensics 2 Presented by : J.Silaa Lecture: FCI 30 Aug 2017
The quieter you become, the more you are able to hear By: Ben Knapic
Should the US government support anonymous web browsing?
Name: John Ostrander Website: exclusionzone.org GPG: B9151AAE
Lesson 4-5 AP Computer Science Principles
Deep and Dark on the Web By: Jim Martin.
Deanonymization of Clients in Bitcoin P2P Network
Man-in-the-Middle Attacks
COMPUTER PRIVACY.
Exercise ?: TOR.
Dark Web, I2P, and Deep Web Team 5
Privacy Through Anonymous Connection and Browsing
The Societal Impact of Tor and Other Anonymizers
Alex Guy packets (stars) tor routers users web servers (squares)
(Information) Privacy
Anonymous Communication
A SEMINAR SYNOPSIS ON XML ENCRYPTION
Presentation transcript:

By: Conor Doherty and Kenneth Cabrera The Tor Network By: Conor Doherty and Kenneth Cabrera

What is the Tor Network? “The Onion Router” A distributed volunteer-based network which uses random pathways and encryption to prevent traffic analysis. “The Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet.” – The Tor Project Website

Project Topics What is the Tor Network? How does Tor function? How does Tor work to preserve anonymity? What are the limits and weaknesses of Tor? How much more secure is Tor than normal internet browsing?

Motivation Many people know of Tor but know nothing about Tor Exploitation of Tor for illegal activity “The Silk Road” “Cracking” of Tor by government agencies (NSA) Privacy and Anonymity becoming serious concern in an age where information is everywhere How can we protect ourselves and what are the limits of that protection?

Our Progress So Far Started by compiling a list of reputable sources Mainly doing background research on Tor What is it? How does it work? Etc. Started compiling a rough research document Compiles all research into one place Currently exploring weaknesses of Tor

Where our research is headed The focal point will be how much better Tor is than normal network browsing/message sending Looking more in depth into all topics discussed Try and discover the strengths as well as the weaknesses of Tor

Sources https://www.torproject.org/about/overview.html.en https://www.torproject.org/getinvolved/volunteer.html.en https://hal.inria.fr/file/index/docid/471556/filename/TorBT.pdf http://www.theguardian.com/world/interactive/2013/oct/04/egotist ical-giraffe-nsa-tor-document