Font Size: a A A

Research On Anonymous Tracking Technology Of Tor

Posted on:2018-05-26Degree:MasterType:Thesis
Country:ChinaCandidate:Y LiuFull Text:PDF
GTID:2348330521950295Subject:Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet technology and the state's high attention to network security,network security issues have gradually become the focus of the whole society.Users in the process of using the Internet are becoming more and more high to the requirement of personal privacy protection,the development of anonymous communication technology just can meet the needs of users in personal privacy.Anonymous communication technology can hide the identity of the communicating parties information or communication relationship,so as to provide users with privacy protection.Tor is currently the most widely used anonymous communication system,which can provide users with good anonymity.However,there are malicious users abuse Tor's anonymity to publish bad information or launch malicious attacks that affect the network environment.Therefore,it is necessary to study anonymous tracing technology in the Tor network and to track malicious users.This paper studies the anonymous tracking technology of Tor network,summarizes the existing tracking technology in the Tor network,studies the tracking technology based on website fingerprint and tracking technology for DDo S attack emphatically.The purpose of learning tracking technology based on website fingerprint is to track the website which users visit.It is discovered that Tor is vulnerable to fingerprint attack through the experiment.The paper also simulates the attacker launch fingerprint attack to track the website which the user visit through the experiment;The study of tracking technology for DDo S attack is to track the originator of DDo S attack,and an onion packet tracking method based on Ip-trace technology is proposed to achieve this goal.The main work of this paper is as follows:(1)Research on the tracking technology based on website fingerprint.This paper studies the tracking technology that using Tor command line access to the website for the first time,uses a new experimental method to collect the fingerprint data that using the Tor command line to access the website,and uses machine learning algorithms to classify fingerprint data set,extracts the classification model of each site.By analyzing the results of the experiment,we find that there are vulnerabilities in the use of the Tor command line to visit the site,and the attacker can use this vulnerability to launch fingerprint attack to trace the site that the user visits.The paper also simulates the entire process of tracking the site which the user visits through a fingerprint attack by an experiment.(2)Research on the tracking technology for DDo S attack in Tor network.In order to track the attacker of DDo S attack in Tor,this paper proposes an onion packet tracking method to track attackers based on IP-Trace technology on the basis of ensuring the anonymity of Tor.This method includes the onion packet marking algorithm and the attack path reconstruction algorithm.Onion packet marking algorithm transforms the unused fields of the network layer header into edge field,index field,and distance field,records the path information according to certain rules,and the path information is stored in the three modified fields.The victim node performs the path reconstruction algorithm,extracts the path information stored in the three marked fields of the attack packet,constructs the attack path,and the first node in the reconstructed attack path is the initiator of the attack.In order to analyze the feasibility of this method,the simulation experiment is carried out in NS2 simulation software with Cell Flood attack.The experimental result shows that this method can construct the attack path of Cell Flood attack and track the attacker effectively.
Keywords/Search Tags:anonymous communication, Tor, anonymous tracking, fingerprint attack, DDoS attack
PDF Full Text Request
Related items