Font Size: a A A

Research On Attacks Classification And Model Improvement For Anonymous Communication System

Posted on:2006-08-15Degree:MasterType:Thesis
Country:ChinaCandidate:S Q ChenFull Text:PDF
GTID:2168360155461944Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
One of the incentives of anonymous communication is to hide either the identity of communicators or the communication relationship within the traffic flow, therefore materilising the users' privacy and better protection for confidential communication.However, all presented secure and defensive technology in anonymous communication are aimed at specific attack, making it infallible to study the attack in order to work out the features of attack and to improve the anonymous communication technology. In terms of the existing research, even though there have been increasing means and methods on attack towards anonymity , no complete and systematic study in the area has been conducted.From an operational viewpoint, an attack on computers or networks refers to the act that the attacker attempts to reach or to link to ultimate objectives .The varying processes that the attacker applies in its attack can help distinguish these attacks, which is the classification principle based on process of anonymous communication. This classification is evaluated by a qualitative analysis and is proved that it can classify all the present attacks preferable, but also supply a strategy of defense.Crowds is a rerouting-based anonymous communication system, whose main principle is to achieve anonymity by exploiting the technology of crowds and rerouting. However,it primarily aims at sender anonymity and is problematic in encryption and decryption thus leading to a functional deficiency.The nCrowds makes improvement on Crowds in that it adds creditable third-party called postman. All messages must be forwarded by postman. This anonymous communication system involves receiver anonymity by hiding the indeed receiver for jondo. Experiment shows that the varying encryption method used in nCrowds can improve performance.
Keywords/Search Tags:Anonymous communication, Attack, Classification, Public Key Encryption, Crowds, Receiver anonymity
PDF Full Text Request
Related items