Visible to the public Weakness Identification and Flow Analysis Based on Tor Network

TitleWeakness Identification and Flow Analysis Based on Tor Network
Publication TypeConference Paper
Year of Publication2018
AuthorsShen, Shiyu, Gao, Jianlin, Wu, Aitian
Conference NameProceedings of the 8th International Conference on Communication and Network Security
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-6567-3
Keywordsdarknet, Human Behavior, Metrics, network traffic analysis, policy-based governance, pubcrawl, resilience, Router Systems Security, security weaknesses, SVM, The Onion Router
Abstract

As the Internet technology develops rapidly, attacks against Tor networks becomes more and more frequent. So, it's more and more difficult for Tor network to meet people's demand to protect their private information. A method to improve the anonymity of Tor seems urgent. In this paper, we mainly talk about the principle of Tor, which is the largest anonymous communication system in the world, analyze the reason for its limited efficiency, and discuss the vulnerability of link fingerprint and node selection. After that, a node recognition model based on SVM is established, which verifies that the traffic characteristics expose the node attributes, thus revealing the link and destroying the anonymity. Based on what is done above, some measures are put forward to improve Tor protocol to make it more anonymous.

URLhttp://doi.acm.org/10.1145/3290480.3290481
DOI10.1145/3290480.3290481
Citation Keyshen_weakness_2018