| With the rapid development and widespread use of Internet, network personal privacy protection and network security has become more and more apparent. It can resist traffic analysis and achieve network communication and anonymous technology through anonymous application. Due to identity of communication partners and communication association is available, anonymous communication system has been widely used, such as in browsing anonymously, mobile agent technology, anonymous electronic voting, anonymous information release, and anonymous control of e-payment, etc. The associated technology of anonymous communication has become a hot field in studying network security.The paper elaborated related concepts of anonymous communication technology firstly, introduced various characteristics of anonymous system, described study situation and development tendency of anonymous system and analyzed realization mechanism of anonymous system. Through choosing Tor ,the typical anonymous communication system in application, the paper laid selective analysis on communication theory and link establishment mechanism of and anonymous communication. It is very difficult for anonymous communication system to give attention to anonymity and efficiency problems. The paper puts forward suggestions on improving link establishment of system, as so to control the cost of anonymity and improve communication efficiency of system.The objective of various anonymous technologies is obtaining the anonymity. The research of anonymity measure has an important guiding significance to the improvement of anonymous system. This paper makes an analysis on the influence of anonymous communication from the respective of the composition of anonymous communication resources, it analyzed the network topology of Tor System, studied and discussed the management approach of anonymous communication resources and resources distribution strategy. It formalized representation on released mechanism of anonymous resources and established enumerated iterative models and evaluated the value of resource discovery, and analyzed the feasible proposal of resource discovery strategy. Moreover, it also analyzed that the released mechanism of anonymous resources make influence on the anonymity of anonymous system. Meanwhile, it put forward the expansion proposals on enumerated discovery mechanism of anonymous communication resources, improved the ability that the hostile nodes maliciously collected system resources so as to protect the anonymity of anonymous system from damage.In order to grasp the distribution and existence condition of anonymous system resources, the paper designed an active detecting strategy of anonymous communication resources, achieved the simulated detection system of anonymous resources and made functional verification on resource detection and route nodes of Tor network. Meanwhile, according to the experimental data, it analyzed the resources distribution of Tor network. And made an evaluation accordingly, such as on the aspects of the operating performance and security of Tor network, etc. |