Visible to the public Biblio

Filters: Author is Tong, L.  [Clear All Filters]
2018-09-12
Lin, Z., Tong, L., Zhijie, M., Zhen, L..  2017.  Research on Cyber Crime Threats and Countermeasures about Tor Anonymous Network Based on Meek Confusion Plug-in. 2017 International Conference on Robots Intelligent System (ICRIS). :246–249.

According to the new Tor network (6.0.5 version) can help the domestic users easily realize "over the wall", and of course criminals may use it to visit deep and dark website also. The paper analyzes the core technology of the new Tor network: the new flow obfuscation technology based on meek plug-in and real instance is used to verify the new Tor network's fast connectivity. On the basis of analyzing the traffic confusion mechanism and the network crime based on Tor, it puts forward some measures to prevent the using of Tor network to implement network crime.