National Repository of Grey Literature 6 records found  Search took 0.02 seconds. 
Tor Network Simulators: Comparison and Usability
Medek, Petr ; Grégr, Matěj (referee) ; Polčák, Libor (advisor)
This thesis talks about simulations of Tor network through simulators Shadow and Tor Path Simulator. As a part of the thesis was created web application using Tor Path Simulator that demonstrates principles of Tor network operation and attacks on it. Created application will run simulations according to parameters input by user and results will be shown using graphs and tables. Application was used as a basis for teaching materials. In my thesis I also focus on Shadow simulator and its usage.
Correlation of Inbound and Outbound Traffic of Tor Network
Coufal, Zdeněk ; Veselý, Vladimír (referee) ; Polčák, Libor (advisor)
Communication in public networks based on the IP protocol is not really anonymous because it is possible to determine the source and destination IP address of each packet. Users who want to be anonymous are forced to use anonymization networks, such as Tor. In case such a user is target of lawful interception, it presents a problem for those systems because they only see that the user communicated with anonymization network and have a suspicion that the data stream at the output of anonymization network belong to the same user. The aim of this master thesis was to design a correlation method to determine the dependence of the data stream at the input and the output of the Tor network. The proposed method analysis network traffic and compares characteristics of data streams extracted from metadata, such as time of occurence and the size of packets. This method specializes in correlating data flows of protocol HTTP, specifically web server responses. It was tested on real data from the Tor network and successfully recognized dependency of data flows.
Malicious Tor Exit Node Detection
Firc, Anton ; Zobal, Lukáš (referee) ; Polčák, Libor (advisor)
The main goal of this bachelor's thesis is to study and implement detection for malicious Tor exit nodes. This work contains information about existing solutions for detecting malicious exit nodes and techniques used for Tor malicious exit nodes detection. This work also discusses design of system for detecting malicious Tor exit nodes tampering with encrypted HTTPS communication when accessing any of the worldwide most visited websites. It describes the process of implementation and testing of designed detection tool. It also deals with detection of malicious exit nodes using implemented tool and describes incident which led to the detection and reporting of a malicious exit node.
Tor Network Simulators: Comparison and Usability
Medek, Petr ; Grégr, Matěj (referee) ; Polčák, Libor (advisor)
This thesis talks about simulations of Tor network through simulators Shadow and Tor Path Simulator. As a part of the thesis was created web application using Tor Path Simulator that demonstrates principles of Tor network operation and attacks on it. Created application will run simulations according to parameters input by user and results will be shown using graphs and tables. Application was used as a basis for teaching materials. In my thesis I also focus on Shadow simulator and its usage.
Malicious Tor Exit Node Detection
Firc, Anton ; Zobal, Lukáš (referee) ; Polčák, Libor (advisor)
The main goal of this bachelor's thesis is to study and implement detection for malicious Tor exit nodes. This work contains information about existing solutions for detecting malicious exit nodes and techniques used for Tor malicious exit nodes detection. This work also discusses design of system for detecting malicious Tor exit nodes tampering with encrypted HTTPS communication when accessing any of the worldwide most visited websites. It describes the process of implementation and testing of designed detection tool. It also deals with detection of malicious exit nodes using implemented tool and describes incident which led to the detection and reporting of a malicious exit node.
Correlation of Inbound and Outbound Traffic of Tor Network
Coufal, Zdeněk ; Veselý, Vladimír (referee) ; Polčák, Libor (advisor)
Communication in public networks based on the IP protocol is not really anonymous because it is possible to determine the source and destination IP address of each packet. Users who want to be anonymous are forced to use anonymization networks, such as Tor. In case such a user is target of lawful interception, it presents a problem for those systems because they only see that the user communicated with anonymization network and have a suspicion that the data stream at the output of anonymization network belong to the same user. The aim of this master thesis was to design a correlation method to determine the dependence of the data stream at the input and the output of the Tor network. The proposed method analysis network traffic and compares characteristics of data streams extracted from metadata, such as time of occurence and the size of packets. This method specializes in correlating data flows of protocol HTTP, specifically web server responses. It was tested on real data from the Tor network and successfully recognized dependency of data flows.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.