期刊文献+

匿名通信系统隐藏服务定位技术研究综述 被引量:4

A Survey on Hidden Service Location Technologies in Anonymous Communication System
下载PDF
导出
摘要 匿名通信系统诞生之初是为了保护通信实体身份的匿名性和网络中通信内容的隐私性、完整性,但随着匿名通信系统的广泛使用,其匿名性不断增强,在隐藏服务技术的支持下,匿名通信系统被不法分子滥用的情况愈演愈烈,在匿名通信系统隐藏服务技术支持下的暗网平台已然成为了“法外之地”.站在网络监管部门的立场上,对匿名通信系统,尤其是匿名通信系统隐藏服务及其定位技术的研究是必要且紧迫的.在对匿名通信系统的基本属性、分类方法和工作原理介绍的基础上,对其隐藏服务的定位技术按照用户位置的不同分为客户端定位和服务端定位分别进行了研究和阐述,重点介绍网络流水印技术、网站指纹攻击方法等代表性的隐藏服务定位技术,同时对现有隐藏服务定位技术的发展现状和优缺点进行总结,最后展望匿名通信系统及其隐藏服务定位技术的未来研究方向. With the rapid development of Internet,people are more and more concerned about their privacy.Anonymous communication systems are designed for protecting the anonymity of communication entities and the privacy and integrity of communication content in networks at the beginning.Along with the improvement of anonymous communication systems,more and more people prefer anonymous communication systems to access the Internet in order to protect their identities and secret.But on the other hand,just because of anonymity,anonymous communication systems have been abused by a large number of criminals nowadays,especially with the support of hidden services technologies,which can strongly protect confidentiality of senders and receivers during communication.Criminals buy and sell pirated software,pornographic videos,drugs,guns,private information and other illegal items through the dark Web platforms.The dark Web platforms have already become a place out of laws with the technical assistance of anonymous communication systems’hidden services technologies.Therefore,the research on the hidden service location technologies of anonymous communication systems is helpful for network supervision and law enforcement departments to effectively collect evidence and accurately crack down on dark Web crimes,it is a necessary and urgent task to locate hidden users in anonymous communication systems for network security management,scholars from domestic and foreign have carried out a lot of research on it.The location technologies of anonymous communication systems have made some effective achievements,but the anonymity is getting stronger and stronger along with the development of location technologies at the same time.Besides,new anonymous communication systems are emerging,hidden service nodes are more hidden and migrate frequently,it is no doubt that the research on hidden service location technologies of anonymous communication systems is a severe and tough challenge to researchers.This paper makes an in-depth study of the existing literatures about anonymous communication systems and hidden service location technologies.Firstly,we summarize the basic tree properties of anonymous communication systems,classify and compare the existing anonymous communication systems according to the proxy mode,communication performance and network structure,also,we introduce traffic obfuscation and anonymous routing techniques in detail,which is used in anonymous communication systems to access and routing anonymously.Then,we identify the scope of hidden services and take Tor,the most famous anonymous communication system at present,as an example to analyze how hidden services work.On the basis of the above content,we classify the location technologies of hidden services into client-side location and server-side location depending on the users’location and analyze typical location methods such as network flow watermark technologies,website fingerprinting attack methods and so on in detail.Furthermore,we summarize several representative hidden service location technologies and analyze the characteristics,advantages and disadvantages of different types of these technologies.Finally,since numerous issues are still open and challenging in the domain of anonymous communication systems’hidden service location technologies,the future research trends and challenges of anonymous communication systems and hidden service location technologies are prospected at the end of this paper.
作者 赵娜 苏金树 赵宝康 韩彪 邹鸿程 ZHAO Na;SU Jin-Shu;ZHAO Bao-Kang;HAN Biao;ZOU Hong-Cheng(Department of Computer Science,National University of Defense Technology,Changsha 410000;Department of Information Science and Technology,Changsha Normal University,Changsha 410100)
出处 《计算机学报》 EI CAS CSCD 北大核心 2022年第2期393-411,共19页 Chinese Journal of Computers
基金 国家重点研发计划项目(2018YFB0204301) 国家自然科学基金(61972412,61601483) 湖南省教育厅科学研究一般项目(19C0140) 长沙市杰出创新青年培养计划(kq1905006) 长沙师范学院校级课题(2019xjzkpy16)资助 国家自然科学基金(61972412,61601483) 湖南省教育厅科学研究优秀青年项目(16B023) 湖南省教育厅科学研究一般项目(19C0140) 长沙市杰出创新青年培养计划(kq1905006)资助。
关键词 匿名通信系统 隐藏服务 客户端定位 服务端定位 anonymous communication system hidden service client-side location server-side location
  • 相关文献

参考文献9

二级参考文献149

  • 1周昌令,钱群,赵伊秋,尚群.校园无线网用户群体的移动行为聚集分析[J].通信学报,2013,34(S2):111-116. 被引量:4
  • 2李强,刘琨,林雁,鞠九滨.使用递增性延迟建立攻击连接链的关联[J].吉林大学学报(理学版),2006,44(2):194-200. 被引量:4
  • 3张连成,王振兴,徐静.一种基于包序重排的流水印技术[J].软件学报,2011,22(2):17-22.
  • 4YLONEN T.The secure shell(SSH)protocol architecture[EB/OL].http://www.ietf.org/rfc/rfc4251.txt,2006.
  • 5IPSEC WORKING GROUP.IP security protocol(IPSec)[EB/OL].http://datatracker.ietf.org/wg/ipsec/,1995.
  • 6ZHANG Y,PAXSON V.Detecting stepping stones[A].Proc of the 9th USENIX Security Symposium[C].Denver,Colorado,2000.171-184.
  • 7BLUM A,SONG D,VENKATARAMAN S.Detection of interactive stepping stones:algorithms and confidence bounds[A].Proc of the 7th International Symposium on Recent Advances in Intrusion Detec-tion[C].Sophia Antipolis,France,2004.258-277.
  • 8HE T,TONG L.Detecting encrypted stepping stone connections[J].IEEE Transactions on Signal Processing,2007,55(4):1612-1623.
  • 9ROBERT S,JIE C,PING J,et al.A survey of research in step-ping-stone detection[J].International Journal of Electronic Commerce Studies,2011,2(2):103-126.
  • 10DINGLEDINE R,MATHEWSON N,SYVERSON P.Tor:the sec-ond-generation onion router[A].Proc of the 13th USENIX Security Symposium[C].San Diego,USA,2004.303-320.

共引文献130

同被引文献36

引证文献4

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部