Font Size: a A A

Design And Implementation Of Encrypted Proxy Traffic Obfuscation System Based On Simulating BT Traffic

Posted on:2021-05-21Degree:MasterType:Thesis
Country:ChinaCandidate:Y WangFull Text:PDF
GTID:2518306311470844Subject:Master of Engineering
Abstract/Summary:PDF Full Text Request
As an emerging space for human social activities,cyberspace has been expanding and developing rapidly in recent years.More and more attention is paid to the security of cyberspace,and network censorship and anonymous communication technologies have emerged.Encrypted communication technology has been widely used for thousands of years as a technology that can effectively protect the contents of communications from unauthorized third parties.However,with the advent and development of traffic censorship,this technology once again threatens the security of encrypted communications.Thus,anonymous communication technology was born.As the level of traffic censorship continues to improve,anonymous communication technology is also constantly breaking through,more and more design ideas are proposed,more and more anonymous communication systems are implemented,anonymous communication technology has become an important topic in the field of network security research.At present,there is a lot of room for exploration in the field of anonymous communication technology,and it is very important to study anonymous communication technology and try new paths to protect the information security of individuals and even the society.This paper focuses on the study of traffic obfuscation anonymous communication techniques for cryptographic proxies based on simulated BT traffic to address the shortcomings of traditional cryptographic communication techniques and existing anonymous communication techniques in dealing with traffic censorship techniques.(1)This paper examines the shortcomings of encrypted communication techniques in coping with traffic censorship techniques,and summarizes the technical routes,implementations,and technical shortcomings of existing anonymous communication techniques.(2)A cryptographic proxy traffic obfuscation anonymous communication system design based on simulated BT traffic is proposed.By combining cryptographic communication technology,anonymous proxy technology and traffic obfuscation technology,it provides an effective way to break through the current traffic censorship system.(3)A prototype system programming study was carried out to design a cryptographic proxy traffic obfuscation anonymous communication prototype system based on simulated BT traffic.Using an object-oriented design approach,the base class was constructed,the basic data structure was defined,and the common functional modules were implemented;by inheriting and extending the base class,the client and server side were implemented respectively.(4)The performance of the prototype system of encrypted proxy traffic obfuscation anonymous communication based on simulated BT traffic is tested and analyzed.The effectiveness of the system scheme and program design is verified by testing and analyzing the anonymity,reliability,availability,confidentiality and anti detection of the system.
Keywords/Search Tags:Anonymous Communication, Traffic Censorship, Traffic Obfuscation, Encrypted Communication, Anonymity, Prototype Systems, Cryptographic Proxies, Usability Analysis, BT Traffic
PDF Full Text Request
Related items