作者
Mehran Alidoost Nia, Amir Hassani Karbasi, Reza Ebrahimi Atani
发表日期
2014/10/30
研讨会论文
4th International eConference on Computer and Knowledge Engineering (ICCKE)
页码范围
685 - 690
出版商
IEEE
简介
Encrypted data cannot ensure full immunity especially in anonymous applications, Even though it protect data by encryption methods. On the other side, we encounter with a set of huge processing units that can reveal data pattern through Internet frameworks. Although intruders are not able to break encrypted layers of data, still they can concentrate on the nature of the transmitted data. In the other hand, set of sent packages that have the same features, have been considered as a victim. As an example of this vulnerability, anonymous applications like Tor can be detected by their data pattern. In this paper an anti-detection mechanism has been proposed. This framework uses a crypto-type system for data pattern generation. Also a stochastic algorithm is responsible for timely propagation of the data. The entire system has been performed on an anonymous data pattern that is responsible for data exchange through …
引用总数
学术搜索中的文章
MA Nia, AH Karbasi, RE Atani - 2014 4th International Conference on Computer and …, 2014