Researchers improve de-anonymization attacks for websites hiding on Tor
Researchers have developed a new technique that could allow attackers to determine with a high degree of accuracy which Tor websites users are accessing and where those websites are hosted.The new attack, which improves upon previous traffic fingerprinting techniques, was devised by researchers from the Massachusetts Institute of Technology (MIT) and the Qatar Computing Research Institute (QCRI), who found ways to differentiate between different types of connections in a user’s encrypted Tor traffic.The Tor anonymity network was built to hide from network snoopers which websites or other Internet resources that user is accessing. It does this by wrapping the user’s requests in several layers of encryption and routing them through multiple computers that run the Tor software.To read this article in full or to leave a comment, please click here
Nuage Networks brings a unique combination of groundbreaking technologies and an unmatched networking expertise to the SDxCentral community. Check out the new channel for more insight on Nuage's work in the SDN and NFV space.
"My NokAlu board is green, ready for jump."
If you missed out on the Cisco DemoFriday, don't fret. Cisco was nice enough to give us a quick Q&A following their demo.
Don’t get overwhelmed by data – leverage it to make smarter decisions for your organization. Symantec and Cisco talk about how to do it.
