files/journal/2022-09-02_12-54-44-000000_354.png

Journal of Engineering and Applied Sciences

ISSN: Online 1818-7803
ISSN: Print 1816-949x
118
Views
0
Downloads

Traffic Analysis of Anonymity Protocol using HMM-Based Trust Model

Yousif H. Sulaiman
Page: 2390-2397 | Received 21 Sep 2022, Published online: 21 Sep 2022

Full Text Reference XML File PDF File

Abstract

The implementation of a traffic attack in order to Tor network analysis is considered in this study. Tor performance and previous attacks against Tor network by other researchers presented in the references were studied. This gives us some insight into the growth in popularity of the anonymity network. Then the experimental environment is set up and the experimental procedure is built. The results of the experiment indicate the need for setting the model confidence for the analysis of anonymity protocol. The effectiveness of the suggested algorithm based trust model is demonstrated by calculating the amount of training data set required for the output of wireless access protocol proxies through Tor.


How to cite this article:

Yousif H. Sulaiman. Traffic Analysis of Anonymity Protocol using HMM-Based Trust Model.
DOI: https://doi.org/10.36478/jeasci.2020.2390.2397
URL: https://www.makhillpublications.co/view-article/1816-949x/jeasci.2020.2390.2397