• Title/Summary/Keyword: Tor Network

Search Result 30, Processing Time 0.024 seconds

Classification of Tor network traffic using CNN (CNN을 활용한 Tor 네트워크 트래픽 분류)

  • Lim, Hyeong Seok;Lee, Soo Jin
    • Convergence Security Journal
    • /
    • v.21 no.3
    • /
    • pp.31-38
    • /
    • 2021
  • Tor, known as Onion Router, guarantees strong anonymity. For this reason, Tor is actively used not only for criminal activities but also for hacking attempts such as rapid port scan and the ex-filtration of stolen credentials. Therefore, fast and accurate detection of Tor traffic is critical to prevent the crime attempts in advance and secure the organization's information system. This paper proposes a novel classification model that can detect Tor traffic and classify the traffic types based on CNN(Convolutional Neural Network). We use UNB Tor 2016 Dataset to evaluate the performance of our model. The experimental results show that the accuracy is 99.98% and 97.27% in binary classification and multiclass classification respectively.

Anonymity of Tor Users on Unsecured Applications (비 암호화 프로그램 사용자의 토르망 익명성 보장 분석)

  • Shin, Seok-Joo;Dahal, Saurav;Pudasaini, Amod;Kang, Moon-Soo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.5
    • /
    • pp.805-816
    • /
    • 2017
  • Tor is a popular, low-latency open network that offers online anonymity to users by concealing their information from anyone conducting traffic analysis. At the same time, a number of conventional passive and active attacking schemes have been proposed to compromise the anonymity provided by the Tor network. In addition to attacks on the network through traffic analysis, interacting with an unsecured application can reveal a Tor user's IP address. Specific traffic from such applications bypasses Tor proxy settings in the user's machine and forms connections outside the Tor network. This paper presents such applications and shows how they can be used to deanonymize Tor users. Extensive test studies performed in the paper show that applications such as Flash and BitTorrent can reveal the IP addresses of Tor users.

Design and Implementation of Tor Traffic Collection System Using Multiple Virtual Machines (다수의 가상머신을 이용한 토르 트래픽 수집 시스템 설계 및 구현)

  • Choi, Hyun-Jae;Kim, Hyun-Soo;Shin, Dong-Myung
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.1
    • /
    • pp.1-9
    • /
    • 2019
  • We intend to collect and analyze traffic efficiently in order to detect copyright infringement that illegally share contents on Tor network. We have designed and implemented a Tor traffic collection system using multiple virtual machines. We use a number of virtual machines and Mini PCs as clients to connect to Tor network, and automate both the collection and refinement processes in the traffic collection server through script-based test client software. Through this system, only the necessary field data on Tor network can be stored in the database, and only 95% or more of recognition of Tor traffic is achieved.

Making private Tor network by designating Tor circuit (Tor의 circuit 지정을 통한 사설 Tor 네트워크 구성)

  • Lee, Hyo-Seok;Kim, Seung-ryong;Choi, Hyoung-Kee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.705-707
    • /
    • 2013
  • The second-generation onion routing(Tor)는 전 세계의 Tor 사용자들이 자발적으로 Onion router(OR)이 되어서 다른 Tor 사용자들의 인터넷 익명성을 보장해 준다. 이때 Tor는 수 많은 OR들 중에서 임의적으로 그리고 일정 기준을 통과한 3개를 선택하여 Tor circuit 을 생성하게 된다. Tor를 연구하는데 있어서 가장 큰 문제점은 전세계 다양한 OR을 통과하여 이동하기 때문에 Tor 네트워크를 통해서 이동하는 패킷에 대한 내용을 확인하기 어렵다는 점이다. 하지만 Tor circircuit 구성하는 과정에서 자신이 지정한 OR들을 통해 패킷이 이동한다면 Tor 네트워크의 특징을 연구하는데 큰 도움이 된다. 이를 위해 사용자가 지정한 OR을 이용하도록 소스코드를 수정해 보았다.

Effect of trans-octylene rubber(TOR) on the properties of NBR/EPDM rubber blends (Trans-octylene rubber(TOR)의 첨가가 NBR/EPDM 고무블렌드의 물성에 미치는 영향)

  • Shin, Yung-Sik;Chang, Young-Wook
    • Elastomers and Composites
    • /
    • v.35 no.2
    • /
    • pp.149-156
    • /
    • 2000
  • trans-octylene rubber(TOR) was melt-blended with an incompatible NBR/EPDM (70/30) blend. Mixing torque and temperature were reduced as TOR was added to the NBR/EPDM blend. Rheometer results indicated that TOR participated in vulcanization and became a part of network. A scanning electron micrograph demonstrated that EPDM was dispersed in NBR matrix in the blend and the addition of TOR led to a finer dispersion of EPDM particles. On the addition of TOR, the tensile strength, the tensile strain as well as the modulus of the blend vulcanizates increased. The ozone resistance of the blends determined in terms of critical stress-strain parameter was significantly enhanced in the blend as TOR was added. Improvements in the properties were believed to be associated with fine morphology and the increase in crosslink density due to the chain entanglement of the ternary blends.

  • PDF

A Tor Security Policy using Exit Relay Methodology (출구 릴레이 방법론을 이용한 Tor 보안 정책)

  • Jang, Duk-Sung;Park, So-Yeon;Choi, Du-Young
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.6
    • /
    • pp.911-917
    • /
    • 2017
  • Tor proxy tool is studied which is most frequently used for ransomeware to penetrate into sensitive information. It will be researched for the malicious methods to spread virus by using Tor and considered a countermeasure to prevent them. We present exit relay methodology for Tor security policy, simulate it, and get a probability to detect the ransomeware. And we compare it with TSS technology which is able to protect the attack via virtual server on exit relay.

Mammalian target of rapamycin inhibitors for treatment in tuberous sclerosis

  • Kim, Won-Seop
    • Clinical and Experimental Pediatrics
    • /
    • v.54 no.6
    • /
    • pp.241-245
    • /
    • 2011
  • Tuberous sclerosis complex (TSC) is a genetic multisystem disorder that results from mutations in the TSC1 or TSC2 genes, and is associated with hamartomas in several organs, including subependymal giant cell tumors. The neurological manifestations of TSC are particularly challenging and include infantile spasms, intractable epilepsy, cognitive disabilities, and autism. The TSC1- and TSC2-encoded proteins modulate cell function via the mammalian target of rapamycin (mTOR) signaling cascade, and are key factors in the regulation of cell growth and proliferation. The mTOR pathway provides an intersection for an intricate network of protein cascades that respond to cellular nutrition, energy levels, and growth factor stimulation. In the brain, TSC1 and TSC2 have been implicated in cell body size, dendritic arborization, axonal outgrowth and targeting, neuronal migration, cortical lamination, and spine formation. The mTOR pathway represents a logical candidate for drug targeting, because mTOR regulates multiple cellular functions that may contribute to epileptogenesis, including protein synthesis, cell growth and proliferation, and synaptic plasticity. Antagonism of the mTOR pathway with rapamycin and related compounds may provide new therapeutic options for TSC patients.

A Study on Detecting of an Anonymity Network and an Effective Counterstrategy in the Massive Network Environment (대용량 네트워크 환경에서 익명 네트워크 탐지 및 효과적 대응전략에 관한 연구)

  • Seo, Jung-woo;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.667-678
    • /
    • 2016
  • Due to a development of the cable/wireless network infra, the traffic as big as unable to compare with the past is being served through the internet, the traffic is increasing every year following the change of the network paradigm such as the object internet, especially the traffic of about 1.6 zettabyte is expected to be distributed through the network in 2018. As the network traffic increases, the performance of the security infra is developing together to deal with the bulk terabyte traffic in the security equipment, and is generating hundreds of thousands of security events every day such as hacking attempt and the malignant code. Efficiently analyzing and responding to an event on the attack attempt detected by various kinds of security equipment of company is one of very important assignments for providing a stable internet service. This study attempts to overcome the limit of study such as the detection of Tor network traffic using the existing low-latency by classifying the anonymous network by means of the suggested algorithm about the event detected in the security infra.

Dual TORCs driven and B56 orchestrated signaling network guides eukaryotic cell migration

  • Kim, Lou W.
    • BMB Reports
    • /
    • v.50 no.9
    • /
    • pp.437-444
    • /
    • 2017
  • Different types of eukaryotic cells may adopt seemingly distinct modes of directional cell migration. However, several core aspects are regarded common whether the movement is either ameoboidal or mesenchymal. The region of cells facing the attractive signal is often termed leading edge where lamellipodial structures dominates and the other end of the cell called rear end is often mediating cytoskeletal F-actin contraction involving Myosin-II. Dynamic remodeling of cell-to-matrix adhesion involving integrin is also evident in many types of migrating cells. All these three aspects of cell migration are significantly affected by signaling networks of TorC2, TorC1, and PP2A/B56. Here we review the current views of the mechanistic understanding of these regulatory signaling networks and how these networks affect eukaryotic cell migration.

Mechanistic target of rapamycin and an extracellular signaling-regulated kinases 1 and 2 signaling participate in the process of acetate regulating lipid metabolism and hormone-sensitive lipase expression

  • Li, Yujuan;Fu, Chunyan;Liu, Lei;Liu, Yongxu;Li, Fuchang
    • Animal Bioscience
    • /
    • v.35 no.9
    • /
    • pp.1444-1453
    • /
    • 2022
  • Objective: Acetate plays an important role in host lipid metabolism. However, the network of acetate-regulated lipid metabolism remains unclear. Previous studies show that mitogen-activated protein kinases (MAPKs) and mechanistic target of rapamycin (mTOR) play a crucial role in lipid metabolism. We hypothesize that acetate could affect MAPKs and/or mTOR signaling and then regulate lipid metabolism. The present study investigated whether any cross talk occurs among MAPKs, mTOR and acetate in regulating lipid metabolism. Methods: The ceramide C6 (an extracellular signaling-regulated kinases 1 and 2 [ERK1/2] activator) and MHY1485 (a mTOR activator) were used to treat rabbit adipose-derived stem cells (ADSCs) with or without acetate, respectively. Results: It indicated that acetate (9 mM) treatment for 48 h decreased the lipid deposition in rabbit ADSCs. Acetate treatment decreased significantly phosphorylated protein levels of ERK1/2 and mTOR but significantly increased mRNA level of hormone-sensitive lipase (HSL). Acetate treatment did not significantly alter the phosphorylated protein level of p38 MAPK and c-Jun aminoterminal kinase (JNK). Activation of ERK1/2 and mTOR by respective addition in media with ceramide C6 and MHY1485 significantly attenuated decreased lipid deposition and increased HSL expression caused by acetate. Conclusion: Our results suggest that ERK1/2 and mTOR signaling pathways are associated with acetate regulated HSL gene expression and lipid deposition.