浏览全部资源
扫码关注微信
1. 中国科学院 计算技术研究所,北京 100190
2. 中国科学院 信息工程研究所,北京 100093
[ "王啸(1986-),男,河北邢台人,中国科学院博士生,国家计算机网络应急技术处理协调中心工程师,主要研究方向为匿名通信、隐蔽通信与信息对抗。" ]
[ "方滨兴(1960-),男,江西万年人,中国工程院院士,主要研究方向为计算机网络和信息安全。" ]
[ "刘培朋(1987-),男,山东日照人,中国科学院博士生,主要研究方向为匿名通信、隐蔽通信和信息对抗。" ]
[ "郭莉(1969-),女,湖南株洲人,中国科学院高级工程师、教授、博士生导师,主要研究方向为信息内容安全管理、网络安全、数据流处理和网络流计算等。" ]
[ "时金桥(1978-),男,黑龙江哈尔滨人,博士,中国科学院副研究员,主要研究方向为信息对抗技术和隐私保护技术。" ]
网络出版日期:2015-02,
纸质出版日期:2015-02-25
移动端阅览
王啸, 方滨兴, 刘培朋, 等. Tor匿名通信网络节点家族的测量与分析[J]. 通信学报, 2015,36(2):80-87.
Xiao WANG, Bin-xing FANG, Pei-peng LIU, et al. Measuring and analyzing node families in the Tor anonymous communication network[J]. Journal on communications, 2015, 36(2): 80-87.
王啸, 方滨兴, 刘培朋, 等. Tor匿名通信网络节点家族的测量与分析[J]. 通信学报, 2015,36(2):80-87. DOI: 10.11959/j.issn.1000-436x.2015036.
Xiao WANG, Bin-xing FANG, Pei-peng LIU, et al. Measuring and analyzing node families in the Tor anonymous communication network[J]. Journal on communications, 2015, 36(2): 80-87. DOI: 10.11959/j.issn.1000-436x.2015036.
重点关注Tor匿名通信系统的家族(family)设计,从连续两年的Tor网络真实数据中提取了数千个Tor节点家族,揭示了Tor节点家族的规模、带宽、地理分布等规律,同时也研究了超级家族背后的运营者身份。基于测量结果的分析验证了Tor的家族设计在保障其匿名性方面所发挥的不可替代的重要作用。相应的安全性分析说明了恶意Tor节点家族对Tor网络可用性带来的挑战,也揭露了Tor网络中隐藏家族现象的普遍性及其对Tor网络匿名性所造成的威胁。
Tor family was focused on design and given a family-level measurement of it.Based on Tor node families (over 3000) discovered from live Tor network data (from Jan.2011 to Dec.2012)
a few characteristics of Tor node families were revealed
such as family size
bandwidth
geographical distribution as well as operators providing a few big families.The analysis validated the irreplaceable role played by family design in enhancing Tor’s anonymity.Based on the measurement
security analysis showed the serious availability threat a compromised node family can cause to the Tor network.Besides
It also discussed Tor hidden families and the potential anonymity risk caused by them.
DINGLEDINE R , MATHEWSON N , SYVERSON P . Tor:the second-generation onion router [A ] . Proceedings of the 13th Conference on USENIX Security Symposium [C ] . 2004 .
Tor metrics portal [EB/OL ] . https://metrics.torproject.org/:TheTorProject https://metrics.torproject.org/:TheTorProject 2013 .
DINGLEDINE R , MATHEWSON N . Design of a blocking-resistant anonymity system [R ] . The Tor Project , 2006 .
高峰 , 杨明 , 罗军舟 等 . Tor匿名通信流量在线识别方法 [J ] . 软件学报 , 2013 , 24 ( 3 ): 540 - 556 .
HE G , YANG M , LUO J Z , et al . Online identification of Tor anonymous communication traffic [J ] . Journal of Software , 2013 , 24 ( 3 ): 540 - 556 .
THE TOR PROJECT.Tor directory protocol,version 3 [EB/OL ] . https://gitweb.torproject.org/torspec.git/blob/HEAD:/dir-spec.txt https://gitweb.torproject.org/torspec.git/blob/HEAD:/dir-spec.txt , 2013 .
FEAMSTER N , DINGLEDINE R . Location diversity in anonymity networks [A ] . Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society [C ] . 2004 . 66 - 76 .
STEVEN J , MURDOCH , PIOTR ZIELIŃSKI . Sampled traffic analysis by internet-exchange-level adversaries [A ] . Proceedings of the 7th International Conference on Privacy Enhancing Technologies [C ] . 2007 . 167 - 183 .
BAUER K , MCCOY D , GRUNWALD D , et al . Low-resource routing attacks against tor [A ] . Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society [C ] . 2007 . 11 - 20 .
DINGLEDINE R , MATHEWSON N . Tor path specification [EB/OL ] . https://gitweb.torproject.org/torspec.git?a=blob_plain;hb=HEAD;f=path-spec.txt https://gitweb.torproject.org/torspec.git?a=blob_plain;hb=HEAD;f=path-spec.txt , 2013 .
LING Z , LUO J , YU W , et al . Extensive analysis and large-scale empirical evaluation of Tor bridge discovery [A ] . IEEE INFOCOM [C ] . 2012 . 2381 - 2389 .
WANG X , SHI J , FANG B , et al . An empirical analysis of family in the Tor network [A ] . IEEE International Conference on Communications [C ] . Budapest , 2013 . 1995 - 2000 .
EDMAN M , SYVERSON P . As-awareness in tor path selection [A ] . Proceedings of the 16th ACM conference on Computer and Communications Security [C ] . 2009 . 380 - 389 .
BRUCE SCHNEIER . Attacking Tor:how the NSA targets users' online anonymity [EB/OL ] . http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity:Guardian News and Media Limited http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity:Guardian News and Media Limited , 2013 .
MCCOY D , BAUER K , GRUNWALD D , et al . Shining light in dark places:understanding the tor network [A ] . Proceedings of the 8th International Symposium on Privacy Enhancing Technologies [C ] . Berlin , 2008 . 63 - 76 .
WANG X , SHI J , GUO L . Towards analyzing family misconfiguration in tor network [A ] . Computer Science and its Applications,Lecture Notes in Electrical Engineering [C ] . 2012 . 503 - 514 .
VASSERMAN E , JANSEN R , TYRA J , et al . Membership-concealing overlay networks [A ] . Proceedings of the 16th ACM Conference on Computer and Communications security [C ] . 2009 . 390 - 399 .
MCLACHLAN J , HOPPER N . On the risks of serving whenever you surf:vulnerabilities in Tor's blocking resistance design [A ] . Proceedings of the 8th ACM Workshop on Privacy in the Electronic Society [C ] . 2009 . 31 - 40 .
LI C , XUE Y , DONG Y , et al . Super nodes in Tor:existence and security implication [A ] . Proceedings of the 27th Annual Computer Security Applications Conference [C ] . 2011 . 217 - 226 .
0
浏览量
1553
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构