Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Host fingerprint-based anonymous network hiding service tracing method

An anonymous network and network service technology, applied in the field of anonymous network hidden service traceability based on host fingerprints, can solve the problem of low probability, achieve the effect of reducing difficulty, reducing cost and easy access

Active Publication Date: 2017-10-20
INST OF INFORMATION ENG CAS
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The anonymity cracking technology based on active and passive flow analysis requires the attacker to control the entry node (EntryGuard) of the anonymous network link at the same time, so as to monitor Internet users entering the entry node of the anonymous network and the entry node of the hidden service, and then use the time and The method of correlating packet size characteristics, although this method has high accuracy, the probability of an attacker being able to control the entry and exit nodes of an anonymous network at the same time is very low, and the protocol vulnerability method is often fixed by developers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Host fingerprint-based anonymous network hiding service tracing method
  • Host fingerprint-based anonymous network hiding service tracing method
  • Host fingerprint-based anonymous network hiding service tracing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the above-mentioned features and advantages of the present invention more comprehensible, the following specific embodiments are described in detail in conjunction with the accompanying drawings.

[0026] The present invention provides a method for tracing the source of anonymous network hidden services based on host fingerprints, such as figure 1 As shown, the steps include:

[0027] 1) Construct the host fingerprint information base of the global IPv4 address space.

[0028] The present invention proposes an Internet-oriented host fingerprinting method, that is, for each host, through network scanning programs such as Zmap, identify the ports opened by the host, and extract HTTP, HTTPS, SSH, IMAP (s) running on the host. ), POP3(s), BitCoin and other network service fingerprint information; where the fingerprint information of each host is identified by the union of fingerprint information of all network services running on the host. And the network...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a host fingerprint-based anonymous network hiding service tracing method comprising the steps of: 1) building a host fingerprint information base of a global IPv4 address space, wherein the fingerprint information of each host is identified by the union of fingerprint information of all the network services running on the host; 2) extracting fingerprint information of an anonymous network hiding service open port, wherein fingerprint information of each anonymous network hiding service is identified by the union of fingerprint information of all ports which are opened by the hidden service; and 3) matching fingerprint information of the extracted anonymous network hiding service in the host fingerprint information base of the global IPv4 address space to achieve anonymous network hidden service traceability. This method enhances the efficiency of hiding service traceability of anonymous networks and at the same time can be widely used to combat criminal activities that use anonymous networks.

Description

technical field [0001] The invention relates to the source tracing direction of network attacks in the field of information security, in particular to a method for tracing the source of anonymous network hidden services based on host fingerprints. Background technique [0002] As a major privacy-enhancing technology, anonymous communication technology is widely used in all aspects of the Internet. The existing anonymous communication technology mainly uses multiple store and forward (using Mix network and onion routing technology) to change the appearance of messages (packet Delay, out-of-order, message filling, etc.), and use the refresh mechanism of the Mix network to eliminate the correspondence between messages, thereby providing privacy protection for online users. Typical low-latency anonymous communication systems include Tor, I2P, etc. [0003] These anonymous communication systems not only protect the identity information of Internet users, but also protect the iden...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0421H04L63/1416H04L63/1441H04L2463/146
Inventor 王学宾谭庆丰
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products