Detecting Tor in Your Network

Logo
Presented by

Ollie Sheridan, Gigamon Principal Engineer; Brandon Dunlap, Moderator

About this talk

Tor, "The Onion Router", is a protocol for anonymously browsing the Internet as well as ".onion" sites that are only accessible via the Tor Network (and is largely seen as bad news for a network). While the origins of Tor were noble, bad actors and criminals have used and abused the Tor network as a means to undertake illegal activities, safe in the knowledge that catching them in the act is, at very best, extremely difficult. Join Gigamon and (ISC)2 as we explore: • The history and origins of Tor • How the Tor network is constructed • How Tor can be detected on your network • Ideas and strategies to capturing the network traffic required to know of Tor's presence • Securing your network against Tor usage
Related topics:

More from this channel

Upcoming talks (9)
On-demand talks (152)
Subscribers (5069)
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures.