【24h】

Detecting Intruders and Preventing Hackers from Evasion by Tor Circuit Selection

机译:通过Tor电路选择检测入侵者并防止黑客逃避

获取原文
获取原文并翻译 | 示例

摘要

The widely-used Tor network has become the most popular anonymous network that supports circuit-based low-latency internet connections. However, recent security breach incidents reveal SSH have been used to launch attacks by malicious users. Although a server-side blocking mechanism which can identify SSH connections individually has been proposed, we have found that it is restricted to certain Tor circuit protocol versions and not for all SSH protocol implementations. The prior method is based on the difference of latency in the Tor network which may be subject to hacker manipulation by circuit selection in the Tor network. In this paper, we first present a set of attributes that can be used to detect SSH connection through Tor for all SSH handshake between client and server, by observing the network packets exchanges of the SSH protocol. In the second half of this paper, we show that the geographical location of the nodes in Tor circuit has an impact on the effectiveness of our metrics. If hackers know our detection algorithm, they may be able to evade the detection. We demonstrate the effectiveness of our attacks detection by analyzing multiple Tor circuit selections. Finally, we identify and evaluate our detection algorithm and demonstrate that our algorithm achieves 98% accuracy under the most stringent condition.
机译:广泛使用的Tor网络已成为支持基于电路的低延迟Internet连接的最流行的匿名网络。但是,最近的安全漏洞事件表明SSH已被恶意用户用来发起攻击。尽管已经提出了一种可以单独识别SSH连接的服务器端阻止机制,但我们发现它仅限于某些Tor电路协议版本,而不是针对所有SSH协议实现。先前的方法基于Tor网络中的等待时间的差异,该延迟可能受到Tor网络中电路选择的黑客操纵。在本文中,我们首先提出一组属性,这些属性可用于通过观察SSH协议的网络数据包交换来检测客户端和服务器之间所有SSH握手通过Tor进行的SSH连接。在本文的后半部分,我们显示了Tor电路中节点的地理位置对度量指标的有效性有影响。如果黑客知道我们的检测算法,则他们可能能够逃避检测。通过分析多个Tor电路选择,我们证明了攻击检测的有效性。最后,我们确定并评估了我们的检测算法,并证明了我们的算法在最严格的条件下可达到98%的准确度。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号