• Sonuç bulunamadı

This is accomplished by making use of the TOR software at the client side

N/A
N/A
Protected

Academic year: 2021

Share "This is accomplished by making use of the TOR software at the client side"

Copied!
3
0
0

Yükleniyor.... (view fulltext now)

Tam metin

(1)

TOR: ANONYMOUS COMMUNICATION ENHANCES THE SECURITY IN THE NETWORKS

A THESIS SUBMITTED TO THE GRADUATE SCHOOL OF APPLIED SCIENCES OF

NEAR EAST UNIVERSITY

By

AVIN MOHAMMED HASAN

In Partial Fulfilment of the Requirements for the Degree of Master of Science

in

Computer Information Systems

NICOSIA 2014

(2)

1 ABSTRACT

Computer security has become one of the most important topics in everyday internet use.

There are many domestic, industrial, and military applications where it may be necessary to hide information while working on the internet. The aim of the research in this thesis is to establish a connection between the client and the server machines in such a way that the identity of the client shall not be revealed to the server. This is accomplished by making use of the TOR software at the client side. The real aim in this thesis is to investigate and compare the time which is needed to arrive the data from a source to a destination by using TOR software package. The investigation is carried out both with and without using the TOR software. The TOR software establishes a connection which ensures that the communication channel is established to the server through a network of relays, so that the actual client IP address will be hidden and the connection will be anonymous. The results indicated that sending data by TOR requires more time than sending the data without using TOR. Although TOR gives high security and hides the details of the sender it slows down the data transmission.

Keywords: TOR, network, anonymous, privacy, browser, Wireshark.

(3)

2 ÖZET

Bilgisayar güvenliği günlük internet kullanımızda en önemli konulardan biri haline gelmiştir.

Evimizde, endüstride ve askeri uygulamalarda internetde çalışırken bilgi saklama ihtiyacını duyduğumuz birçok konular bulunmaktadır. Bu tezin amacı client ve server bilgisayarları arasında veri alış verişi olurken verinin nerden geldiğini saklamaktır. Bu amaçla TOR yazılım programı kullanılmıştır. Tezde TOR kullanarak ve TOR kullanmayarak iki bilgisayar arasında veri alış verişi yapılmış ve IP adresinin gizlendiği gözlemlenmiştir. Ayrıca bilgi alış verişinde zamanlama üzerine istatiksel veriler toplanmıştır. Tezde varılan neticeye göre TOR veriyi saklamaktadır fakat buna karşılık veri alış veriş hızını düiürmektedir.

Anahtar kelimeler: TOR, ağ, gizlilik, internet sörf, Wireshark

Referanslar

Benzer Belgeler

The acoustic signatures of the six different cross-ply orthotropic carbon fiber reinforced composites are investigated to characterize the progressive failure

For instance, if there is a higher priority class of customers (whose service and interarrival times are also exponentially distributed) which can preempt the service of a

In Section 3.1 the SIR model with delay is constructed, then equilibrium points, basic reproduction number and stability analysis are given for this model.. In Section

He firmly believed t h a t unless European education is not attached with traditional education, the overall aims and objectives of education will be incomplete.. In Sir

For this reason, there is a need for science and social science that will reveal the laws of how societies are organized and how minds are shaped.. Societies have gone through

It establishes the experimental foundations on which the verification of the theoretical analysis carried out in the classroom is built.. In this course the theoretical and

Çalışma kapsamında iki iplikli ve elastanlı örnek bir örme kumaşın saatlik üretim miktarı ve birim maliyet tutarı teorik olarak çıkarılmıştır. Ayrıca süprem, iki

Eğitim öğretim faaliyetlerinin en önemli sorunlarından biri değiştirilmek istenen davranış veya kazandırılan bilginin kalıcılığını sağlamaktır. Bilgilerin