通信学报 ›› 2015, Vol. 36 ›› Issue (2): 80-87.doi: 10.11959/j.issn.1000-436x.2015036

• 学术论文 • 上一篇    下一篇

Tor匿名通信网络节点家族的测量与分析

王啸1,2,3,4,5,方滨兴1,2,4,刘培朋1,2,3,4,郭莉2,4,时金桥2,4   

  1. 1 中国科学院 计算技术研究所,北京 100190
    2 中国科学院 信息工程研究所,北京 100093
    3 中国科学院 研究生院,北京 100190
    4 信息内容安全国家工程实验室,北京 100093
    5 国家计算机网络应急技术处理协调中心,北京 100029
  • 出版日期:2015-02-25 发布日期:2017-06-27
  • 基金资助:
    国家高技术研究发展计划(“863”计划)基金资助项目;国家高技术研究发展计划(“863”计划)基金资助项目;国家自然科学基金资助项目;国家科技支撑计划基金资助项目;国家科技支撑计划基金资助项目

Measuring and analyzing node families in the Tor anonymous communication network

Xiao WANG1,2,3,4,5,Bin-xing FANG1,2,4,Pei-peng LIU1,2,3,4,Li2 GUO2,4,Jin-qiao SHI2,4   

  1. 1 Institute of Computing Technology,Chinese Academy of Sciences,Beijing 100190,China
    2 Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093,China
    3 Graduated University of Chinese Academy of Sciences,Beijing 100190,China
    4 Chinese National Engineering Laboratory for Information Security Technologies,Beijing 100093,China
    5 National Computer Network Emergency Response Technical Team/Coordination Center,100029,China
  • Online:2015-02-25 Published:2017-06-27
  • Supported by:
    The National High Technology Research and Development Program of China (863 Program);The National High Technology Research and Development Program of China (863 Program);The National Natural Science Foundation of China;The National Key Technology R&D Program;The National Key Technology R&D Program

摘要:

重点关注Tor匿名通信系统的家族(family)设计,从连续两年的Tor网络真实数据中提取了数千个Tor节点家族,揭示了Tor节点家族的规模、带宽、地理分布等规律,同时也研究了超级家族背后的运营者身份。基于测量结果的分析验证了Tor的家族设计在保障其匿名性方面所发挥的不可替代的重要作用。相应的安全性分析说明了恶意Tor节点家族对Tor网络可用性带来的挑战,也揭露了Tor网络中隐藏家族现象的普遍性及其对Tor网络匿名性所造成的威胁。

关键词: Tor, 匿名通信, 节点家族, 收割攻击, 测量, 隐藏家族

Abstract:

Tor family was focused on design and given a family-level measurement of it.Based on Tor node families (over 3000) discovered from live Tor network data (from Jan.2011 to Dec.2012),a few characteristics of Tor node families were revealed,such as family size,bandwidth,geographical distribution as well as operators providing a few big families.The analysis validated the irreplaceable role played by family design in enhancing Tor’s anonymity.Based on the measurement,security analysis showed the serious availability threat a compromised node family can cause to the Tor network.Besides,It also discussed Tor hidden families and the potential anonymity risk caused by them.

Key words: Tor, anonymous communication, node family; harvesting attack, measurement, hidden family

No Suggested Reading articles found!