| In such an Internet era, the information security problem is getting more and more attention. Attackers can just use the loopholes of protocol to launch eavesdropping or traffic analysis attacks, then they can obtain the identity information of both sides of communications, conclude some valuable information further, which will take great loss to users. Based on the demand of protection the identity information of communications entity, people put forward anonymous communication technology. One of the anonymous communication's important purposes is to hide the identity information of both side of communications or communication relationship, which will realize better protection of users'privacy and secret communications.Onion Routing is most widely used technology of anonymous communication. TOR anonymous communication system is the second generation Onion Router. It can make anonymous web browse and announcement, real-time communications, IRC, SSH and other TCP applications on the Internet. In this paper, the source code of the TOR system research, analysis of the TOR system, the anonymous principle, workflow, process of onion proxy building a hidden path, packet formats and routing strategy. Its greatest character is low-latency.The study found there is a security risk of TOR system. The open member control strategy lets some malicious users can be entering the anonymous system. Under the protection of the anonymous system, the network attacks of malicious users can't be traced, which results in abuse of anonymity. Especially some malicious users make use of TOR system to process DDoS attack. They have set up many anonymous paths to target node, allied to send many attacking packets to the target node, making the node invalid for a long time, resulting in greater damage. In order to avoid the abuse of anonymity, then the ability of controlling anonymity should be taken into account, which is to research anonymous control technology.This paper on the basis of further research on DDoS attack in TOR system, put forward a certified anonymous control program based on Multi-hash encoding. The program uses packet marking technique to trace onion packets, makes use of the TrustMark from Trusted Third Party and signcryption technology to attest the packet marking, and at last after validation from Trusted Third Party, then the IP address of anonymity abuser can be obtained, which ensure the anonymity of legal users. This paper brings forward certified packet marking algorithm and tracking algorithm, demonstrating and analyzing the security and accuracy of the program. |