Font Size: a A A

Research On Anonymous Evaluation Model Of Anonymous P2P Network

Posted on:2022-06-04Degree:MasterType:Thesis
Country:ChinaCandidate:P Y ZhaoFull Text:PDF
GTID:2518306764995799Subject:Automation Technology
Abstract/Summary:PDF Full Text Request
With the rapid development and wide application of the Internet,the security of personal privacy information on the Internet is facing severe challenges.In order to ensure the privacy and security of users,the research on anonymous communication systems has an urgent need and great practical significance.However,anonymous communication technology is a double-edged sword.Many illegal network services are also protected by the anonymous system,such as the sale of illegal drugs,the smuggling of rare birds and animals,and the trading of illegal firearms and ammunition.The anonymity evaluation of the anonymous communication system not only contributes to the improvement and enhancement of the existing anonymity system,but also further realizes a controllable and reliable anonymity system,and combats illegal and criminal activities on the basis of better ensuring user privacy,So as to make the anonymous P2 P network healthier.At present,researchers have given qualitative measurement methods and standards of anonymity according to specific anonymous networks,and have used more specific,more general,and more accurate quantitative methods to express system anonymity for the realization of independent networks.When evaluating the anonymity of an anonymous P2 P network,there is no universal and universal model that can replace the specific system implementation.When the number of anonymous network nodes under study increases,the complexity of analysis and calculation may increase exponentially.The workload of artificially analyzing the network is huge.And according to the different attack targets of the attackers,the information about the anonymous P2 P network obtained by the attack methods is also different,so an effective evaluation scheme and model are needed to simplify this problem.This paper abstracts it into an undirected probability graph model based on the realization technology of anonymity in the anonymous P2 P network,specifically describes the organizational structure and node composition of the probability graph model,and introduces some common attack methods,and explains how to obtain Network information forms an attacker model.On this basis,according to different attack targets and anonymity types,different anonymous evaluation methods are formed to evaluate them: the receiver anonymous evaluation scheme based on Naive Bayes and the relational anonymous evaluation model based on Markov chain.When evaluating receiver anonymity,estimate the anonymous relationship probability between a specific sender and potential receivers.Based on the Naive Bayes algorithm,the relative probability that any rerouting path belongs to potential receivers and the relationship between specific senders and potential receivers can be calculated.The accuracy rate of the probability distribution of the relationship can reach more than 95%,and finally the receiver anonymity is evaluated according to the information entropy measurement method.The relationship anonymity evaluation is to measure the entire network from a global perspective.The essence is to calculate the relationship probability between potential senders and potential receivers.The construction and specific evaluation process of the Markov chain-based relationship anonymous evaluation model are described in detail.Relational anonymity evaluation comprehensively evaluates anonymity from the global system,anonymous set,users themselves and associated nodes,and finally applies this evaluation model to a specific communication topology network to verify its effectiveness.In conclusion,this paper illustrates the representation of anonymous P2 P networks through probabilistic graphical models and designs an evaluation model for receiver and relational anonymity.
Keywords/Search Tags:anonymous evaluation, anonymous P2P network, probabilistic graphical model, naive bayes, markov chain
PDF Full Text Request
Related items