Font Size: a A A

Research And Implementation Of Tor High Reliable Nodes

Posted on:2021-12-16Degree:MasterType:Thesis
Country:ChinaCandidate:Z Y DuFull Text:PDF
GTID:2518306308972889Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the continuous development of information technology,the Internet not only brings great convenience to people,but also exposes many kinds of privacy information in the network,which makes people pay more and more attention to the protection of personal privacy,anonymous network Tor also be shipped,and with more and more routing nodes joining,it has been growing and growing,and it has become the most widely used anonymous network at present.However,the development of things always has two sides.For anonymous network Tor,the threat brought by vigorous development is that the security attacks against Tor and its users are more and more frequent.Targeted research on high reliable nodes in anonymous network Tor is of great significance to prevent security attacks and improve the stability and reliability of Tor network.This paper first introduces the traditional sybil attack types and defense methods,explains the concepts of anonymous network Tor and routing nodes in Tor,summarizes the instructive research of high reliable nodes in Tor network,points out that the previous mainstream methods and models of sybil attacks can not be well applied to Tor network.In this paper,a new idea is proposed to study the high reliable nodes in Tor,that is,to study the sybil nodes and the unreliable nodes,and then to study and realize the high reliable nodes.In this paper,a sybil node mining experiment is carried out based on the research of Tor's 11TB aggregate data over the years from 2005 to 2019 and real-time data.The experiment is divided into two parts,the first part is sybil nodes detection method,through the experimental research on six aspects of routing nodes' behavior state,the analysis methods needed to detect sybil nodes are defined,and the general characteristics of sybil groups are summarized.The second part is the prediction method of sybil nodes,by building a model to further study the influence of the main features,the mining experiment can not only effectively detect sybil nodes in Tor,but also effectively discover the possible unreliable nodes in Tor.This paper also implements a Tor high reliable nodes analysis system,and elaborates on the overall architecture,module division,key code implementation and other aspects of the system.In addition to systematic implementation of nodes data acquisition,unreliable nodes detection and discovery,unreliable nodes prediction and other functions,it also proposes a reliability evaluation mechanism based on exponential weighted feedback,which can effectively evaluate the reliability and reputation of nodes to obtain the high reliable nodes in Tor.Finally,it demonstrates the specific operations that can be accomplished by using high reliable nodes through application examples.
Keywords/Search Tags:Anonymous communication, Tor, Routing nodes, Sybil attack, Reliability evaluation
PDF Full Text Request
Related items