Font Size: a A A

An Enhancing Security Research Of Tor Anonymous Communication To Against DDos Attacks

Posted on:2018-10-21Degree:MasterType:Thesis
Country:ChinaCandidate:M T ZhaoFull Text:PDF
GTID:2348330536480512Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the popularity and development of network technology,internet is widely accepted as a communication and information dissemination tool.At present,the commonly used network protocols are HTTP,TCP/IP etc.,which are all open to the public.Eavesdroppers could intercept the using communication packets and infer the identity of user further.In order to protect user's privacy and security in the network communication process,anonymous communication technologies came into being.Tor is the most widely used system in the field of anonymous communications,which is developed based on the first generation of onion routing technology.Tor anonymous communication system has the advantages of low latency,high confidentiality of transmission content and high security of communication channel,which is widely used in the anonymous browsing of Web,the field of instant communication etc.In the present study,the composition principle of Tor anonymous communication system,the joining process of Tor nodes and the establishment process of Tor link were described.Then,lacks of part of anonymity and access authentication in the phase of node to join which provide favorable conditions for attackers to attack DDos were discussed.An identity-based concurrent signature scheme was adopted to verify the reliability of the access of the Tor node that leads to eliminate the false nodes largely in the present study.Signcryption technology was used to ensure the unforgeability of the authentication information in the verification process to improve the safety and efficiency of the Tor network.Finally,in order to verify that the present scheme can effectively reduce the probability of DDos attack by inserting a false node in a Tor system.The openness of the scheme has been proved,and the scheme was compared with the existing program.Therefore,the present scheme showed advantages in terms of performance and efficiency.
Keywords/Search Tags:Tor(The Second Onion Router), Anonymous communication, DDos, Signcryption, Concurrent signature
PDF Full Text Request
Related items