期刊文献+

匿名通信系统集中式资源分发模型及其分析

A Central Resource Distribution Model and the Analysis in Anonymous Communication System
下载PDF
导出
摘要 研究了匿名通信系统抗封锁技术,针对接入节点分发的问题提出一种集中式资源分发的通用模型.在此模型基础上,通过理论计算和实验仿真对典型情况下采用随机策略的资源分发模型进行了抗攻击性分析,该模型可用来评估采用随机策略进行资源分发的匿名通信系统抗封锁设计的抗攻击能力,以及攻击者需要投入多少资源进行对抗.分析结果表明,实际应用中抗封锁系统可以选取合适的每个用户接入节点分发数和建设大量接入节点来改善对抗能力,而对于攻击者可根据接入节点数进行适当的资源投入来对抗. A general model of central resource distribution is proposed by studying the designs of blocking-resistant anonymity system and considering the problem of access point information distribution.Based on this model,analysis of its specialized model with random-choice strategy is given,which could be used for evaluating the anti-attack ability of such systems and how much it costs to counter for the attacker.Simulation shows that the practical blocking-resistant systems could select the appropriate amount of access points for each user and have a large number of active access points to improve the ability,and the censor could make appropriate investment according to the amount of access points to counter.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2010年第2期126-129,134,共5页 Journal of Beijing University of Posts and Telecommunications
基金 国家高技术研究发展计划项目(2007AA01Z430) 国家自然科学基金项目(60821001) 高等学校学科创新引智计划项目(B08004) 国家重点基础研究发展计划项目(2007CB311100)
关键词 匿名通信 抗封锁 抗网络审查 资源分发 anonymous communication blocking resistance censorship resistant resource distribution
  • 相关文献

参考文献6

  • 1Dingledine R, Mathewson N, Syverson P. Tor: the second-generation onion router[ C ]// Blaze M. 13th USENIX Security Symposium. San Diego: USENIX, 2004: 303- 320.
  • 2Berthold O, Federrath H, Kopsell S. Web MIXes: a system for anonymous and unobservable Internet access [ C ]// PET 2000. Berkeley: Springer, 2000 : 115-129.
  • 3Dingledine R, Mathewson N. Design of a blocking-resistant anonymity system [ EB/OL ]. 2007 [ 2009/04/20 ]. http ://www. torproject, org/svn/trunk/doc/design-paper/ blocking, pdf.
  • 4Kopsell S, Hilling U. How to achieve blocking resistance for existing systems enabling anonymous web surfing[ C]// WPES 2004, Washington: ACM, 2004 : 47-58.
  • 5Douceur J R. The sybil attack [ C ]// IPTPS 2002. Cambridge : Springer, 2002 : 251-260.
  • 6Feamster N, Balazinska M, Wang W, et al. Thwarting web censorship with untrusted messenger discovery [ C ]// PET 2003. Dresden: Springer, 2003 : 125-140.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部