Chinese Journal of Network and Information Security ›› 2019, Vol. 5 ›› Issue (1): 66-77.doi: 10.11959/j.issn.2096-109x.2019008
• Papers • Previous Articles Next Articles
Yun YANG(),Lingyan LI,Qingzheng WEI
Revised:
2018-12-20
Online:
2019-02-01
Published:
2019-04-10
Supported by:
CLC Number:
Yun YANG, Lingyan LI, Qingzheng WEI. Comparative study of anonymous network Tor and I2P[J]. Chinese Journal of Network and Information Security, 2019, 5(1): 66-77.
"
Tor | I2P |
Cell,细胞 | Message,消息 |
Client,客户 | Router、Clients,路由器或客户端 |
Circuit,电路 | Tunnel,隧道 |
Directory,目录 | NetDB,网络数据库 |
directory server,目录服务器 | floodfill router,floodfill路由器 |
Entry guard,入境卫兵 | Fast peer,快速对等体 |
Ingress node,入口节点 | Inproxy,入口代理 |
exit node,退出节点 | Outproxy,出口代理 |
hidden service,隐藏服务 | Eepsite or destination,Eepsite或目的地 |
hidden service descriptor,隐藏服务描述符 | lease set,租约集 |
introduction point,介绍点 | inbound gateway,入站网关 |
onion routing,洋葱路由 | garlic routing,大蒜路由 |
Node、Server,节点、服务器 | Router,路由器 |
Onion agent,洋葱代理 | I2P Tunnel客户端 |
Onion service,洋葱服务 | 隐藏服务,Eepsite或目的地 |
Rendezvous Point,会合点 | Inbound Gateway+Outbound Endpoint,入站/出站网关 |
Router descriptor,路由器描述符 | Routerinfo,路由器信息 |
"
匿名服务 | 描述 |
Eepsites | 由基于Jetty2的I2P对等体提供的HTTP服务器 |
susidns | 从Eepsites到目标标识符的映射地址簿 |
BOB | 将任意应用连接到I2P网络的API |
I2PSnark | 作为web应用集成的bittorrent客户端 |
Robert | 用BOB的I2Pbittorrent客户端 |
I2P-bt | 基于bittorrent客户端的命令行 |
Transmission for I2P | bittorrent客户端的端口、向I2P传播 |
I2Phex | Gnutella客户端Phex的I2P移植版,gnutella客户的端口 |
iMule | 基于aMule的文件共享程序 |
Susumail | 假名E-mail服务,通过I2PTunnel利用普通的E-mail客户端访问 |
I2P-Bote | 分布式电子邮件通信系统 |
I2P-Messenger | I2P的即时通信系统 |
Syndiemedia (Syndie) | 博客工具 |
"
Tor版本 | 昵称 | IP地址 | 洋葱路由端口 | 位置 | 具体位置 |
morial | 128.31.0.39 | 9101 | 美国 | 麻省理工学院 | |
Tor26 | 86.59.21.38 | 443 | 奥地利 | 维也纳 | |
dizum | 194.109.206.212 | 443 | 荷兰 | 多德雷赫特 | |
Tonga | 82.94.251.203 | 443 | 荷兰 | 阿姆斯特丹 | |
gabelmoo | 212.112.245.170 | 443 | 德国 | RIRE网络协调中心 | |
Tor0.2.8 | dannenberg | 193.23.244.244 | 443 | 德国 | RIRE网络协调中心 |
urras | 208.83.223.34 | 80 | 美国 | 旧金山 | |
maatuska | 171.25.193.9 | 80 | SE | 瑞典 | |
Faravahar | 154.25.32.5 | 443 | 美国 | 华盛顿 | |
Longclaw | 199.254.238.52 | 443 | 美国 | 西雅图 |
"
行键 | 时间戳 | RouterInfo | LeaseSet | |||||
Node ID | 连接方式 | 密钥 | 入站网关 | I2P服务 | 密钥 | |||
1527991262 | SHA1(IP1 | random()) | IP1+UDP port | AES256/CBC1 | Gateway ID1 | I2P-Syndie | ElGamal公钥1 | ||
SHA256 (节点ID |时间戳) | 1528085415 | SHA1(IP2 | random()) | IP2+UDP port | AES256/CBC2 | Gateway ID2 | I2P-Messanger | ElGamal公钥2 | |
1528210926 | SHA1(IP3 | random()) | IP3+UDP port | AES256/CBC3 | Gateway ID3 | I2P-Hex | ElGamal公钥3 |
"
威胁类型 | Tor | I2P |
概率模型分析 | 数学模型的安全性和匿名性测量 | 数学模型的安全性和匿名性测量 |
DoS攻击 | 目录服务器、入口节点 | NetDB、Floodfill路由器、入口网站 |
流量分析 | 出口节点 | 规模小,流量特征容易识别 |
时间攻击 | 入口/出口节点时间相关性 | 无固定的入口/出口节点,但应用程序的消息频率具有可识别模式 |
合谋攻击 | 植入大量受控节点 | 植入大量蜜罐节点 |
Sybil攻击 | 伪造大量洋葱路由器 | 密钥空间中创建大量填充路由器 |
局部视图攻击 | 用户并不能得到全局节点 | 控制网络中有限数量的对等体 |
全局攻击 | 监听或控制Tor网络上所有节点(包括目录服务器) | 向I2P目的地发送5GB并监控每个人的网络连接 |
交叉口攻击 | 同时在电路的两端,定期与目标进行联系,并跟踪网络上的对等体 | 同时在隧道的两端,定期与目标进行联系,并跟踪网络上的对等体 |
协议漏洞 | 身份认证协议、桥接服务 | 随机选择算法、DHE /ECDHE 算法 |
[1] | SHAHBAR K , ZINCIR-HEYWOOD A N . Weighted factors for measuring anonymity services:a case study on Tor,jondonym,and I2P[R]. 2017. |
[2] | ZHOU Y W , YANG Q L , YANG B ,et al. A Tor anonymous communication system with security enhancements[J]. Journal of Computer Research and Development, 2014,51(7): 1538-1546. |
[3] | CONRAD B , SHIRAZI F . A survey on Tor and I2P[C]// The 9th International Conference on Internet Monitoring and Protection (ICIMP 2014). 2014. |
[4] | GAO J J . Optimization and implementation of I2P anonymous communication system[D]. Beijing:Peking University, 2014. |
[5] | TIMPANARO J P , CHOLEZ T , CHRISMENT I ,et al. Evaluation of the anonymous I2P network's design choices against performance and security[C]// The 1st International Conference on Information Systems Security and Privacy (ICISSP 2015). 2015: 46-55. |
[6] | ZHOU Y . Research on anymous communication based on Tor[D]. Xian:Xidian University,2013, 10. |
[7] | HUANG W J . Uniform distribution routing algorithm based on Tor network[D]. Shanghai:Shanghai Jiaotong University, 2012. |
[8] | LI J S . Research on the Analysis of I2P anonymous communication protocol and flow identification[D]. School of Computer Science &Engineering, 2015. |
[9] | CONTI M , CRANE S , FRASSETTO T ,et al. Selfrando:securing the Tor browser against de-anonymization exploits[J]. Proceedings on Privacy Enhancing Technologies, 2016(4): 454-459. |
[10] | CONRAD B , SHIRAZI F . A survey on Tor and I2P[C]// The 9th International Conference on Internet Monitoring and Protection (ICIMP 2014). 2014. |
[11] | TIMPANARO J P , CHOLEZ T , CHRISMENT I ,et al. Evaluation of the anonymous I2P network’s design choices against performance and security[C]// The 1st International Conference on Information Systems Security and Privacy(ICISSP 2015). 2015: 46-55. |
[12] | ALI A , KHAN M , SADDIQUE M ,et al. TOR vs I2P:a comparative Study[C]// 2016 IEEE International Conference on Industrial Technology (ICIT). 2016. |
[13] | TIMPANARO J P , CHOLEZ T , CHRISMENT I ,et al. Evaluation of the anonymous I2P network's design choices against performance and security[C]// The 1st International Conference on Information Systems Security and Privacy (ICISSP 2015). 2015: 46-55. |
[14] | KARTHIGEYAN A , ROBINSON J M , MANIKANDAN S P ,et al. A comprehensive behavior analysis of Tor versus I2P[C]// International Journal of Applied Engineering Research, 2014,9(20): 7333-7345. |
[15] | HERMANN M . Privacy-implications of performance-based peer selection by onion-routers:a real-world case study using I2P[D]. TU-Munich, 2011. |
[16] | HERRMANN M , CHRISTIAN G . Privacy implications of performance-based peer selection by onion routers:a real-world case study using I2P[C]// 11th Privacy Enhancing Technologies Symposium (PETS 2011). 2011. |
[17] | KARTHIGEYAN A , ROBINSON J M , MANIKANDAN S P ,et al. A comprehensive behavior analysis of Tor versus I2P[J]. International Journal of Applied Engineering Research, 2014,9(20): 7333-7345. |
[18] | JEONG S H , . A longitudinal analysis of I2P leakage in the public DNS infrastructure[C]// 2016 Conference on ACM SIGCOMM. 2016: 557-558. |
[19] | SHAHBAR K . Analysis of multilayer-encryption anonymity networks[D]. Canada:Dalhousie University, 2017. |
[1] | Renfeng CHEN, Hongbin ZHU. Research on credit card transaction security supervision based on PU learning [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 73-78. |
[2] | Jianlong XU, Jian LIN, Yusen LI, Zhi XIONG. Distributed user privacy preserving adjustable personalized QoS prediction model for cloud services [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 70-80. |
[3] | Chenghao YUAN, Yong LI, Shuang REN. Dynamic multi-keyword searchable encryption scheme [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 143-153. |
[4] | Xin SHI, Yunfei GUO, Yawen WANG, Xiaoli SUN, Hao LIANG. Physical-social attributes integrated Sybil detection for Tor bridge distribution [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 103-114. |
[5] | Tao JIANG, Hang XU, Liangmin WANG, Jianfeng MA. Proof of storage with corruption identification and recovery for dynamic group users [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 75-87. |
[6] | Xian ZHANG, Jianming ZHU, Zhiyuan SUI, Shengzhi MING. Analysis on anonymity and regulation of digital currency transactions based on game theory [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 150-157. |
[7] | Yaofei WANG, Weiming ZHANG, Kejiang CHEN, Wenbo ZHOU, Nenghai YU. Survey on image non-additive steganography [J]. Chinese Journal of Network and Information Security, 2021, 7(6): 1-10. |
[8] | Yuxiang CHENG, Weiming ZHANG, Weixiang LI, Nenghai YU. Binary image steganography method based on layered embedding [J]. Chinese Journal of Network and Information Security, 2021, 7(5): 49-56. |
[9] | Yan LI, Wei LIU, Yuanlu SUN. Research on security architecture of strong PUF by adversarial learning [J]. Chinese Journal of Network and Information Security, 2021, 7(3): 115-122. |
[10] | Jian JIA,Linfeng LIU,Jiagao WU. Charging pile recommendation method for idle electric taxis based on recurrent neural network [J]. Chinese Journal of Network and Information Security, 2020, 6(6): 152-163. |
[11] | Zhenhua CAI,Jiayun LIN,Fang LIU. Blockchain storage:technologies and challenges [J]. Chinese Journal of Network and Information Security, 2020, 6(5): 11-20. |
[12] | Rensheng WANG,Tianhao WU,Lin ZHANG,Konglin ZHU. Cooperative trajectory prediction system for intelligent and automated connected convoy based on blockchain [J]. Chinese Journal of Network and Information Security, 2020, 6(3): 78-87. |
[13] | Kai LEI,Fangxing SHU,Lei HUANG,Qichao ZHANG. Research on cross-domain trustable blockchain based decentralized DNS architecture [J]. Chinese Journal of Network and Information Security, 2020, 6(2): 19-34. |
[14] | Jin LI,Songqi WU,Senlin ZHANG,Yueming LU. Trusted storage mechanism of distributed electric energy data based on blockchain [J]. Chinese Journal of Network and Information Security, 2020, 6(2): 87-95. |
[15] | Meisheng HAI,Peng YI,Yiming JIANG,Jichao XIE. Large-scale resource state monitoring strategy in network function virtualization environment [J]. Chinese Journal of Network and Information Security, 2019, 5(6): 42-49. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|