首页> 外文会议>IEEE Conference on Local Computer Networks >Exploring Deployment Strategies for the Tor Network
【24h】

Exploring Deployment Strategies for the Tor Network

机译:探索Tor网络的部署策略

获取原文
获取外文期刊封面目录资料

摘要

In response to upcoming performance and security challenges of anonymity networks like Tor, it will be of crucial importance to be able to develop and deploy performance improvements and state-of-the-art countermeasures. In this paper, we therefore explore different deployment strategies and review their applicability, impact, and risks to the Tor network. In a simulation-based evaluation, which leverages historical data of Tor, we show that the deployment strategies can practically be applied to realize significant protocol changes in Tor. Our results, however, also indicate that during the transitional phase a certain degradation of anonymity is unavoidable.
机译:为了应对诸如Tor之类的匿名网络即将出现的性能和安全挑战,至关重要的是能够开发和部署性能改进和最新对策。因此,在本文中,我们探索了不同的部署策略,并审查了它们的适用性,影响和对Tor网络的风险。在利用Tor的历史数据的基于仿真的评估中,我们表明部署策略可以实际应用于实现Tor的重要协议更改。但是,我们的结果还表明,在过渡阶段,不可避免地会降低匿名性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号