Defense Against Protocol Level Attack in Tor Network using Deficit Round Robin Queuing Process
Among different types of network, Tor network is mostly referred as an onion-routing network which enables the anonymous communication and supports TCP applications over the network. The onion-routing is utilized by the Tor network for transmitting the information of users via virtual circuits which...
Main Authors: | K. Sangeetha, K. Ravikumar |
---|---|
Format: | Article |
Language: | English |
Published: |
Elsevier
2018-11-01
|
Series: | Egyptian Informatics Journal |
Online Access: | http://www.sciencedirect.com/science/article/pii/S1110866517301457 |
Similar Items
-
Design and Implementation on Efficient Fair Queuing of Deficit Round Robin with FPGA.
by: Shin-Ye Yang, et al.
Published: (2010) -
Low Complexity Packet Scheduling Algorithm: Adaptive Fair Queuing with Round-Robin
by: Kun-Xuan Lin, et al.
Published: (2006) -
Design and Implement of Deficit Round Robin Chip for Bridge
by: Wen-Shiou Ho, et al.
Published: (2011) -
Hierarchical Deficit Round-Robin Packet Scheduling Algorithm
by: Shih-Hao Liu, et al.
Published: (2013) -
Data-plane Defenses against Routing Attacks on Tor
by: Tan Henry, et al.
Published: (2016-10-01)