Abstract:
Tor is a very powerful tool for avoiding restrictions of the Internet usage in local networks (companies or educational/public institutions). For example, students use it on everyday basis at university computer labs. In order to prevent such misuse from happening, most effective solutions widely known go as far as obtaining current list of Tor nodes and updating the local network security policy with thousands of IP addresses. In this paper, one more efficient and effective method is presented by analyzing Tor package source code as well as aiming at core infrastructure of Tor network. This method is much more reliable and consumes fewer resources while completing the task with success. It is used instead of not so reliable frequent Tor nodes sniffing, which is mainstream approach.
CITATION:
IEEE format
V. Stanojević, “Blocking Tor - Insight Approach,” in Sinteza 2017 - International Scientific Conference on Information Technology and Data Related Research, Belgrade, Singidunum University, Serbia, 2017, pp. 25-29. doi:10.15308/Sinteza-2017-25-29
APA format
Stanojević, V. (2017). Blocking Tor - Insight Approach. Paper presented at Sinteza 2017 - International Scientific Conference on Information Technology and Data Related Research. doi:10.15308/Sinteza-2017-25-29