期刊文献+

针对Tor的网页指纹识别研究综述 被引量:5

Webpage Fingerprinting Identification on Tor:A Survey
下载PDF
导出
摘要 随着Web服务的发展,以匿名网络为代表的互联网隐私保护技术越来越受到重视.用户可以通过匿名网络隐藏真实的访问目标,在互联网上匿名浏览网页.然而网页指纹识别仍能通过监听和分析网络流量判断出用户真实的访问目标,从而破坏匿名性.因此,网页指纹识别的方法也能对匿名网络实施监管和审查,避免不法分子滥用隐私保护技术进行非法活动或掩盖罪行.无论从隐私保护还是网络监管的角度来说,网页指纹识别都是值得重点关注的技术手段.在介绍网页指纹识别的概念和发展基础上,针对最有代表性的匿名系统Tor,重点阐述和分析面向单标签和面向多标签的2类网页指纹识别,并讨论其工作原理、性能特点和局限性(例如过于简化的研究假设和缺乏系统的实验评估).最后总结和展望网页指纹识别的未来发展方向. With the prosperous development of Web services,protecting Web-surfing privacy has become a significant concern to society.Various protection techniques(e.g.,anonymous communication networks)have been proposed to help users hide the real access targets and anonymously browse the Internet.However,Webpage fingerprinting(WF)identifications,through monitoring and analyzing network traffic,can still determine whether a Web page is visited by exploiting network traffic features,thus jeopardizing the anonymity.On the other hand,law enforcement agencies can leverage the methods of WF identification to monitor anonymous networks to prevent abusing them for carrying out illegal activities or covering up crimes.Therefore,WF identification is a significant and noteworthy technique for privacy protection and network supervision.In this survey,we first introduce the concept and development of WF identifications,and then focus on two kinds of WF identifications on Tor,a widely used anonymous network,including single-tag oriented identifications and multi-tag oriented identifications.In particular,the characteristics of these WF identifications are analyzed and these WF limitations are pointed out,such as simplistic assumptions and insufficient experiments for systematical evaluation.Finally,future research directions for WF identifications are concluded.
作者 孙学良 黄安欣 罗夏朴 谢怡 Sun Xueliang;Huang Anxin;Luo Xiapu;Xie Yi(School of Informatics,Xiamen University,Xiamen,Fujian 361005;Fujian Key Laboratory of Sensing and Computing for Smart City(Xiamen University),Xiamen,Fujian 361005;Department of Computing,The Hong Kong Polytechnic University,Hong Kong 999077)
出处 《计算机研究与发展》 EI CSCD 北大核心 2021年第8期1773-1788,共16页 Journal of Computer Research and Development
基金 国家自然科学基金项目(61771017,61671397,61772438,61972313) 香港创新及科技基金项目(GHP 05219SZ)。
关键词 网页指纹识别 Tor匿名通信 隐私保护 流量分析 机器学习 网络监管 Webpage fingerprinting identification Tor anonymous communication privacy preserving traffic analysis machine learning network supervision
  • 相关文献

参考文献5

二级参考文献35

  • 1Dingledine R, Mathewson N, Syverson P. Tor: The second- generation onion router//Proceedings oi the 13th USENIX Security Symposium. San Diego, USA, 2004:21-21.
  • 2Yu W, Fu XW, Graham X, et al. DSSS-based flow marking technique for invisible traceback//Proceedings of the IEEE Symposium on Security and Privacy (IEEE S P). Oakland, USA, 2007:18-32.
  • 3Ling Z, Luo JZ, Yu W, et al. A new cell-counting-based attack against tor. IEEE/ACM Transactions on Networking, 2012, 20(4): 1245-1261.
  • 4Hintz A. Fingerprinting websites using traffic analysis// Proceedings of the Privacy Enhancing Technologies Workshop. San Francisco, USA, 2002:171-178.
  • 5Sun Q, Simon D, Wang Y, et al. Statistical identification of encrypted Web browsing traffic//Proeeedings of the 2002 IEEE Symposium on Security and Privacy (IEEE S -P). Oakland, USA, 2002:19-30.
  • 6Bissias G, Liberatore M, Jensen D, Levine B. Privacy vulnerabilities in encrypted HTTP streams//Proceedings of the Privacy Enhancing Technologies Workshop. ,Cavtat, Croatia, 2005:1-11.
  • 7Liberatore M, Levine B. Inferring the source of encrypted HTTP connections//Proceedings of the 13th ACM Conference on Computer and Communications Security(CCS). Alexandria, USA, 2006:255-263.
  • 8Herrmann D, Wendolsky R, Federrath H. Website finger- printing: Attacking popular privacy enhancing technologies with the multinomial naive-bayes classifier//Proceedings of the 2009 ACM Workshop on Cloud Computing Security (CCSW). Chicago, USA, 2009:31-42.
  • 9Lu L, Chang E, Chan M. Website fingerprinting and identi- fication using ordered feature sequences//Proceedings of the European Symposium on Research in Computer Security (ESORICS). Athens, Greece, 2010:199-214.
  • 10Ling Z, Luo JZ, Zhang Y, et al. A novel network delay based side-channel attack: Modeling and defense//Proceed- ings of the 31th IEEE International Conference on Computer Communications (INFOCOM). Orlando, USA, 2012: 2390- 2398.

共引文献252

同被引文献15

引证文献5

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部