首页> 外文会议>International Conference on Network and System Security >Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network
【24h】

Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network

机译:挖掘匿名流量:对Tor匿名网络的深入分析

获取原文

摘要

Users' anonymity and privacy are among the major concerns of today's Internet. Anonymizing networks are then poised to become an important service to support anonymous-driven Internet communications and consequently enhance users' privacy protection. Indeed, Tor an example of anonymizing networks based on onion routing concept attracts more and more volunteers, and is now popular among dozens of thousands of Internet users. Surprisingly, very few researches shed light on such an anonymizing network. Beyond providing global statistics on the typical usage of Tor in the wild, we show that Tor is actually being is-used, as most of the observed traffic belongs to P2P applications. In particular, we quantify the BitTorrent traffic and show that the load of the latter on the Tor network is underestimated because of encrypted BitTorrent traffic (that can go unnoticed). Furthermore, this paper provides a deep analysis of both the HTTP and BitTorrent protocols giving a complete overview of their usage. We do not only report such usage in terms of traffic size and number of connections but also depict how users behave on top of Tor. We also show that Tor usage is now diverted from the onion routing concept and that Tor exit nodes are frequently used as 1-hop SOCKS proxies, through a so-called tunneling technique. We provide an efficient method allowing an exit node to detect such an abnormal usage. Finally, we report our experience in effectively crawling bridge nodes, supposedly revealed sparingly in Tor.
机译:用户的匿名和隐私是当今互联网的主要问题之一。然后匿名网络准备成为支持匿名驱动的互联网通信的重要服务,从而提高用户的隐私保护。实际上,基于洋葱路由概念的匿名网络的模拟是吸引了越来越多的志愿者,现在流行了数十万个互联网用户。令人惊讶的是,很少有研究在这种匿名网络上的揭示。除了在野外的典型用途提供全局统计数据之外,我们表明实际上是使用的tor,因为大多数观察到的流量都属于P2P应用。特别是,我们量化了BitTorrent流量,并表明由于加密的BitTorrent流量(可以忽略),所以在Tor网络上的负载低估了此外,本文对HTTP和BitTorrent协议提供了深入的分析,提供了完整的使用情况。我们不仅在交通规模和连接数量方面报告此类使用,而且还描​​绘了用户在TOR顶部的表现方式。我们还表明,通过所谓的隧道技术,我们现在从洋葱路由概念转移到洋葱路由概念,并且通过所谓的隧道技术,转矩的概念频繁用作1跳袜子代理。我们提供一种有效的方法,允许退出节点检测这种异常使用。最后,我们报告了我们在有效爬行桥梁节点中的经验,据说曾经略有透露。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号