Weakness Identification and Flow Analysis Based on Tor Network
Title | Weakness Identification and Flow Analysis Based on Tor Network |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Shen, Shiyu, Gao, Jianlin, Wu, Aitian |
Conference Name | Proceedings of the 8th International Conference on Communication and Network Security |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-6567-3 |
Keywords | darknet, Human Behavior, Metrics, network traffic analysis, policy-based governance, pubcrawl, resilience, Router Systems Security, security weaknesses, SVM, The Onion Router |
Abstract | As the Internet technology develops rapidly, attacks against Tor networks becomes more and more frequent. So, it's more and more difficult for Tor network to meet people's demand to protect their private information. A method to improve the anonymity of Tor seems urgent. In this paper, we mainly talk about the principle of Tor, which is the largest anonymous communication system in the world, analyze the reason for its limited efficiency, and discuss the vulnerability of link fingerprint and node selection. After that, a node recognition model based on SVM is established, which verifies that the traffic characteristics expose the node attributes, thus revealing the link and destroying the anonymity. Based on what is done above, some measures are put forward to improve Tor protocol to make it more anonymous. |
URL | http://doi.acm.org/10.1145/3290480.3290481 |
DOI | 10.1145/3290480.3290481 |
Citation Key | shen_weakness_2018 |