Font Size: a A A

Research On Fingerprinting Attack Technology In Anonymous Communication System

Posted on:2018-04-03Degree:MasterType:Thesis
Country:ChinaCandidate:J ZhangFull Text:PDF
GTID:2348330518994476Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Nowadays, cyberspace security is becoming more and more important and sensitive, and it has become a research hotspot. Privacy protection technology came into being, anonymous communication system as a means of privacy protection has been widely favored. In recent years, a variety of attack techniques have been proposed for anonymous communication systems to trace the communication between sender and receiver in anonymous communication system.Fingerprinting attack using passive flow analysis technology,gathered by the sender or receive both the characteristics of information to identify whether the sender and the receiver of a particular communication, characteristic information can be network traffic characteristics, such as routing information features as well as the node information. The attacker in the communication between the sender and the receiver to collect two form fingerprint characteristic information,when happening again communication can determine the sender and the receiver does exist communication relationship.This article first discusses the development of network flow watermark and fingerprinting attacks, and also this paper briefly describes the Tor and I2P anonymous communication system. Afterwards, this paper expounds the network attack technology on flow watermark and fingerprint attack technology. Secondly, Cai et al. in Stony Brook University put up the CAI fingerprinting attacks technology.We described the attack model and attack process of CAI fingerprinting attack. We also made an experimental verification to CAI fingerprint attack, and design a database to store the fingerprinting of target websites.Finally, the paper designed the MSFA (Mutiple System Fingerpringting Attack) Attack scenarios, MSFA solution architecture design are discussed in detail, flow design, obtain the packet capture module information edit distance module design, the design and calculation module and the Tor anonymity System environment MSFA scheme with the experimental data processing, and has carried on the comparative analysis with the result of the experiment.
Keywords/Search Tags:Anonymous Communication System, Fingerprinting Attack Technology
PDF Full Text Request
Related items