DAYANANDA SAGAR COLLEGE OF ENGINEERING
(An Autonomous Institution affiliated to VTU, Accredited with NAAC ‘A’ Grade)
PROJECT SYNOPSIS
DEPARTMENT Computer Science and Engineering
TITLE OF THE PROJECT Demonstration Of Onion Routing
STUDENT NAMES/ USN/ Keerthana R Mrinalini Nehal Sharan Prajwal G
PHONE/ MAIL ID Raghavendran Chandu Hosamani
1DS17CS055 1DS17CS069 1DS17CS070 1DS17CS078
8105051210 9483424859 8310201182 8310176205
keeru1999@gmail
[email protected] [email protected] prajwalhosmani1
.com om m
[email protected]MINI - PROJECT TIMELINE August 2019 - December 2019
(Tentative Start date- End
Date)
PROJECT GUIDE DETAILS Prof. Sarala
FIELD OF PROJECT Onion routing is a technique for anonymous communication over a computer
network. In an onion network, messages are encapsulated in layers of encryption,
analogous to layers of an onion. The encrypted data is transmitted through a series
of network nodes called onion routers, each of which "peels" away a single layer,
uncovering the data's next destination.
BACKGROUND OF PROJECT Tor directs Internet traffic through a free, worldwide, volunteer overlay network
WITH REGARD TO THE consisting of more than seven thousand relays to conceal a user's location and
DRAWBACK ASSOCIATED usage from anyone conducting network surveillance or traffic analysis. Using Tor
WITH EXISTING makes it more difficult to trace Internet activity to the user: this includes "visits to
PRODUCT/PROJECT Web sites, online posts, instant messages, and other communication forms".
Tor does not prevent an online service from determining when it is being accessed
through Tor. Tor protects a user's privacy, but does not hide the fact that someone
is using Tor. Some websites restrict allowances through Tor. For example,
Wikipedia blocks attempts by Tor users to edit articles unless special permission is
sought
OBJECTIVE OF THE In it’s most basic form, onion routing is a technique for anonymous communication
PROJECT over a computer network. The idea of onion routing is to protect the privacy of the
sender and recipient of a message, while also providing protection for message
content as it traverses a network. Onion routing achieves this by making the
messages travel from source to destination via a sequence of proxies, which re-
route messages in an unpredictable path.
PROJECT STATEMENT Demonstration of TOR (The Onion Routing) by using Cisco packet tracer in the local
computer system.
SUMMARY OF THE Onion Routing is a flexible communications infrastructure that is resistant to both
PROJECT eavesdropping and traffic analysis. Onion routing accomplishes this goal by
separating identification from routing. Connections are always anonymous,
although communication need not be. Communication may be made anonymous
by removing identifying information from the data stream. Onion routing can be
used by a variety of unmodified Internet applications by means of proxies (non-
invasive procedure) or by modifying the network protocol stack on a machine to be
connected to the network (moderate or highly-invasive procedure).
MCA/IPR/Project_Template 2017 1
DAYANANDA SAGAR COLLEGE OF ENGINEERING
(An Autonomous Institution affiliated to VTU, Accredited with NAAC ‘A’ Grade)
Onion-routed packets are securely encrypted, with the packets unwrapped by a
symmetric encryption key at each server, peeling off the layers of the message a
server at a time. Onion routing was originally developed by the U.S. Navy, and the
Navy has financed the development of a second-generation onion routing project
known as Tor.
MODE OF CARRYING OUT The project will be carried out in the Computer Science and Engineering
THE PROJECT Department of DSCE.
INTENDED BENEFICIARIES When the word “privacy” comes to mind, you probably think about browsing the
OF THE PROJECT Internet through a proxy. But you know how slow free proxies are. And did you
(industrial/commercial/R& know that they do not protect you as much as you may think? That’s right! Proxies
D/social) often keep logs of traffic that goes through them. Even if they don’t keep logs, the
traffic is easy to sniff out anyway.
Of course, there is another solution: use Onion Routing (OR). Today, I will explain
what onion routing is, how it can benefit you, and even direct you to a special tool
that can connect you to the TOR network with just a few clicks of a button.
ABSTRACT The Onion Router, commonly referred at “Tor” has allowed for practically any
person, regardless of technical expertise, to communicate anonymously over the
Internet. Tor is not a covert means of Internet use, but rather, anonymizes Tor
users in a manner that practically makes tracking or identifying users difficult if not
impossible. The effectiveness of Tor is such that attempting to bypass its ability to
anonymize traffic is overwhelming. In the context of the forensic analysis,
uncovering the Internet communication may not be possible, but the forensic
artifacts left behind may be valuable in the forensics investigation.
MCA/IPR/Project_Template 2017 2