首页> 外文会议>International Conference on Advanced Information Networking and Applications >Examination of Defense Method for Tor User Specific Purpose Attacks by Dummy User Attached Communication
【24h】

Examination of Defense Method for Tor User Specific Purpose Attacks by Dummy User Attached Communication

机译:Dummy用户附加通信对TOR用户特定目的攻击的防御方法

获取原文

摘要

In recent years, the anonymous communication system Tor that prevents the user's access destination website from being specified has become widespread. However, attack methods for anonymity are gradually evolving. As one of the attack methods, there is a "web fingerprint attack" that identifies the Web site accessed by the user from the characteristics of the flowing packets. Therefore, in this paper, we examine a defense method against fingerprint attack against Tor. We devised a method to rewrite the "user fingerprint information" in the access history of legitimate users by analyzing the Tor Hidden Service packet and accessing the target site and dummy site simultaneously using approximate routing with multiple Tor browsers did. This "dummy user generated noise" shows that the effect of fingerprint attack can be reduced.
机译:近年来,防止用户访问目的地网站被指定的匿名通信系统变得普遍。 但是,用于匿名性的攻击方法逐渐发展。 作为攻击方法之一,存在“网指纹攻击”,其识别用户从流程分组的特征访问的网站。 因此,在本文中,我们研究了针对TOR的指纹攻击的防御方法。 我们设计了一种方法来通过分析TOR隐藏服务包并同时使用多个TOR浏览器来访问目标站点和伪站点来重写合法用户的访问历史中的“用户指纹信息”。 这种“虚拟用户生成的噪声”表示可以减少指纹攻击的效果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号