首页> 外文会议>International Conference on Information Networking >Analysis on end-to-end node selection probability in Tor network
【24h】

Analysis on end-to-end node selection probability in Tor network

机译:Tor网络中端到端节点选择概率分析

获取原文

摘要

Tor is an open network that helps to defend against traffic analysis and thus achieves anonymity and resisting censorship online. Nowadays many researches have been carried out to attack Tor and to break the anonymity. To deanonymize the Tor, the attacker must be able to control both the guard node and exit node of a circuit. In this paper, we present an analysis on end-to-end node selection probability when an attacker adds different types of compromised nodes in the existing Tor network. For accurate Tor simulation, we used Shadow simulator for our experiment. By extensive performance evaluation, we conclude that when guard + exit flagged compromised nodes are added to Tor network, the selection probability of compromised nodes gets higher.
机译:Tor是一个开放的网络,有助于防御流量分析,从而实现匿名性和抵制在线审查。如今,已经进行了许多研究来攻击Tor并打破匿名性。为了使Tor匿名,攻击者必须能够控制电路的保护节点和出口节点。在本文中,我们对当攻击者在现有Tor网络中添加不同类型的受感染节点时的端到端节点选择概率进行了分析。为了准确进行Tor仿真,我们在实验中使用了Shadow模拟器。通过广泛的性能评估,我们得出结论,当将防护+出口标记的受害节点添加到Tor网络中时,受害节点的选择概率会更高。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号