| The coming of Internet age has provided a good chance for network to be wild used in social arenas,and it gradually becomes the bridge that connect people’s life and work.People all over the world can share information with each other by Internet.Thus,how to guarantee information safety becomes the main point that people concern.Privacy protection also demands better Internet security.There are two main key points in order to solve privacy issues.Firstly,we should make sure that the transmission data to be protected.Secondly,we should ensure people themselves not to be traced.Nowadays users use anonymous network to solve this problem add up with information encryption,for example,we can use Tor,VPN,VPS or proxy to build one untraceable network to surf the Internet.But there are several shortcomings by using the method expressed before:General proxy technology can prevent users to be traced in some degree,but information still can be stolen for general proxy does not encrypt the data it transmitted,and data just through one intermediate node before arriving at their destination.The main idea for using VPS to connect to the internet is that people entrust all the tasks to one remote computer.So rogue users can hardly find the real host directly.But the data is not encrypted during the transmission.We can’t acquire VPS automatically because of limited resources.The data is encrypted while transmitted by using VPN,it is very difficult to be stolen or tampered.While the resource is relatively lacking and some free VPN may bundle with Trojans,In this case,people are undermined secretly.Tor is one of the most popular untraceable networks in recent years.It has advanced algorithm to encrypt data,there are thousands of relaying nodes,it also owns advanced methods to build data transmission path and a team which is composed of professionals from all over the world.But the ingress nodes and exit nodes will become the weak spot of the whole network.If one node that someone deployed become ingress or exit node,the data can also be tampered or stolen.Most importantly,60%of the funds of Tor is paid by American government,which is more likely to show that Tor is controlled by outside the organization.For these reasons,by studying the exist anonymous network building methods expressed above,we put forward one untraceable network building technology project.On the one hand,we can study the attack techniques that the hackers used and find the corresponding solutions,On the other hand,we also can find the weakness points that the untraceable network exists from the perspective of the defenders and accordingly finding the better way to enhance the defensive ability.And try my best to build a safety network environment eventually. |