Font Size: a A A

Research And Implementation Of Anonymous Network Tor Proxy Service Technology

Posted on:2021-08-13Degree:MasterType:Thesis
Country:ChinaCandidate:D F HuangFull Text:PDF
GTID:2518306308971019Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of the Internet,people's life become more and more convenient with endless Internet applications.While enjoying the convenience of the Internet,people also suffer from privacy leaks,so anonymous communication systems are increasingly necessary.Currently,Tor is the anonymous communication system which has the most users.As of March 2020,Tor has reached 2.5 million users.In order to provide users with the convenient anonymous services,Tor official and community have developed a series of applications and plugins,the most widely used of which is Tor browser.Nevertheless,there are some weaknesses,such as incompatibility,low performance on memory and startup time,inconvenience.In order to avoid that weaknesses,a Tor proxy system will be designed in this thesis.First of all,the principles of Tor and Tor Hidden Service will be introduced in this thesis.Then,this thesis will analyze the weaknesses of the more popular Tor Applications.Next,the theories and technologies related to proxy will be introduced in this thesis,including Proxy or Reverse proxy,Socks5,iptables,Redsocks,and Tor2web.Then,in order to avoid the weaknesses of tor Applications and make proxy safer,a Tor proxy system will be designed in this thesis.The system consists of The Tor Proxy and The Reverse proxy of Tor Hidden service.On the one hand,Socks5 is the core technology of The Tor Proxy,which provides anonymous service for users by proxy.With The Tor Proxy,the target Web service can be anonymously accessed by means of a common web browser instead of a Tor browser.On the other hand,Tor2Web is the core technology of The Reverse proxy of Tor Hidden services,which makes Hidden Services exposed to the Internet.The users can use a common browser to get the Hidden Service which could not be access before by The Reverse proxy of Tor Hidden services.The system is cross-platform,reusable,lightweight,convenient,transparent and more secure.
Keywords/Search Tags:anonymous communication, tor, proxy, socks5, tor2web
PDF Full Text Request
Related items