Professional Documents
Culture Documents
Technical seminar
on
ONION ROUTING
Presented by
Mr.V.Rama Krishna
Assistant professor
Organization
Introduction
Traffic Analysis overview
Onion routing
Example
Problem and solution
Conclusion
References
Introduction:
Types of Attackers on
the web:
Active Attackers
Passive attackers
Traffic Analysis:
Onion Routing:
Network
Infrastructure
Proxy Interfaces
Example:
CONCLUSION
Onion routing can be used in anonymous
network and also in military applications.
Resistant to both eavesdropping and traffic
analysis.
THANK YOU
References
www.onion-router.net
https://en.wikipedia.org/wiki/Onion_ro
uting