Font Size: a A A

Research And Implementation Of Host Anonymous Technology Based On Dynamic Controllable Network Transmission

Posted on:2020-06-12Degree:MasterType:Thesis
Country:ChinaCandidate:H T WuFull Text:PDF
GTID:2518305774491634Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Anonymous communication has a wide range of applications in network security.At present,the commonly used anonymous communication methods and systems have shortcomings such as long access time,low transmission efficiency,single transmission line,and hidden dangers.Based on the existing solutions and technologies,this thesis combines the P2P network architecture in the botnet.The topic of host stealth communication has been studied.The main work is as follows:1.An end-to-end data forwarding model is designed.The model adopts distributed network construction mode.Nodes use a small amount of neighbor node information to form a network connecting the source node and the destination node.This method avoids excessive node information and improves system security.The model adopts periodicity.The method of message delivery updates the network topology to ensure the stability of the network in the case of random changes of the node state.The rerouting anonymity technology is adopted,and multiple routes are used to forward the information of both parties to the communication,so that the two sides of the communication are anonymous.2.A transmission path selection scheme is proposed.In this scheme,a comprehensive evaluation method of nodes is designed according to the hardware,security and network of nodes,and the score results are included in the path selection consideration.Based on the shortest path network topology,the transmission path selection scheme utilizes the real-time change characteristics of the dynamically controllable nodes.During the data transmission process,the nodes independently select the next hop node,which makes the transmission path diverse,flexible,and controllable.3.Based on the above scheme,a simulation experiment was designed and carried out.The simulation results show that the network stability is ensured when the nodes randomly join or leave the network.The anonymity scheme based on rerouting technology realizes the anonymity between the sender and the receiver during the message transmission.The transmission path selection scheme is Based on the network topology formed by the shortest path,the dynamic controllability of the node is used to enrich the number of transmission paths and modify the node preferences in the transmission to protect the security of the anonymous communication system.
Keywords/Search Tags:anonymous communication, botnet, distributed, Self-organizing network
PDF Full Text Request
Related items