[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3290480.3290481acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccnsConference Proceedingsconference-collections
research-article

Weakness Identification and Flow Analysis Based on Tor Network

Published: 02 November 2018 Publication History

Abstract

As the Internet technology develops rapidly, attacks against Tor networks becomes more and more frequent. So, it's more and more difficult for Tor network to meet people's demand to protect their private information. A method to improve the anonymity of Tor seems urgent. In this paper, we mainly talk about the principle of Tor, which is the largest anonymous communication system in the world, analyze the reason for its limited efficiency, and discuss the vulnerability of link fingerprint and node selection. After that, a node recognition model based on SVM is established, which verifies that the traffic characteristics expose the node attributes, thus revealing the link and destroying the anonymity. Based on what is done above, some measures are put forward to improve Tor protocol to make it more anonymous.

References

[1]
S. Benmeziane, N. Badache, S. Bensimessaoud. Tor Network Limits. 2011 International Conference on Network Computing and Information Security. IEEE Computer Society, 2011: 200--205.
[2]
Yi Yang, Han Guo, Yijun Wang, et al. Tor based dark network space resource detection. Communication Technology, 2017, (10): 2304--2309.
[3]
Wenjie Huang. Random uniform routing algorithm based on Tor network. Shanghai jiaotong university, 2012.
[4]
J. A. Elices, F. Perez-Gonzalez. Locating Tor hidden services through an interval-based traffic-correlation attack. Communications and Network Security (CNS). 2013:385--386.
[5]
A. Kwon, M. Alsabah, D. Lazar, et al. Circuit fingerprinting attacks: passive deanonymization of tor hidden services. Proceedings of the 24th USENIX Conference on Security Symposium. USENIX Association, 2015:237--244.
[6]
Song Ming. Research on the key technology of information traceability based on traffic analysis. Beijing University of Posts and Telecommunications, 2014.
[7]
Lin Deng, Anonymous measurement and protocol research of P2P anonymous communication system. Hunan University, 2009.
[8]
Zhongliu Zhuo, Xiaosong Zhang, Ruixin Li,. Onion link anonymous link control method based on node failure. Computer Application, 2015, 35 (10): 2843--2847.
[9]
Ming Yang, Yiting Zhang, Junzhou Luo, Anonymous bandwidth selection algorithm based on random bandwidth weighting. Journal of Southeast University (Natural Science Edition), 2010, 40 (06): 1169--1173.
[10]
Kai Bao, Vulnerability analysis of dark networks based on Tor. University of Electronic Science and technology, 2016.

Cited By

View all
  • (2023)Study Report of Tor Antiforensic TechniquesProceedings of the 2nd International Conference on Cognitive and Intelligent Computing10.1007/978-981-99-2742-5_9(81-91)Online publication date: 27-Sep-2023
  • (2022)SoK: An Evaluation of the Secure End User Experience on the Dark Net through Systematic Literature ReviewJournal of Cybersecurity and Privacy10.3390/jcp20200182:2(329-357)Online publication date: 27-May-2022
  • (2022)Evaluation of Circuit Lifetimes in TorICT Systems Security and Privacy Protection10.1007/978-3-031-06975-8_9(142-157)Online publication date: 3-Jun-2022

Index Terms

  1. Weakness Identification and Flow Analysis Based on Tor Network

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICCNS '18: Proceedings of the 8th International Conference on Communication and Network Security
    November 2018
    166 pages
    ISBN:9781450365673
    DOI:10.1145/3290480
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 02 November 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Darknet
    2. Network Traffic Analysis
    3. SVM
    4. The Onion Router

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICCNS 2018

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)16
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 18 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Study Report of Tor Antiforensic TechniquesProceedings of the 2nd International Conference on Cognitive and Intelligent Computing10.1007/978-981-99-2742-5_9(81-91)Online publication date: 27-Sep-2023
    • (2022)SoK: An Evaluation of the Secure End User Experience on the Dark Net through Systematic Literature ReviewJournal of Cybersecurity and Privacy10.3390/jcp20200182:2(329-357)Online publication date: 27-May-2022
    • (2022)Evaluation of Circuit Lifetimes in TorICT Systems Security and Privacy Protection10.1007/978-3-031-06975-8_9(142-157)Online publication date: 3-Jun-2022

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media