Method used for tracing hidden service in Tor anonymous network

An anonymous network and network technology, applied in the field of Internet security, can solve the problems of low practicability of tracking and traceability technology, and difficulty in tracking the location information of anonymous service locations, achieving good feasibility and practicability, high accuracy, and good technology. The effect of support

Active Publication Date: 2018-09-04
GUANGZHOU UNIVERSITY
View PDF3 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the high anonymity of the hidden service of the Tor anonymous network, the location information of its anonymous service location is difficult to be tracked, and the existing tracking and tracing technology is less practical

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method used for tracing hidden service in Tor anonymous network
  • Method used for tracing hidden service in Tor anonymous network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0030] see figure 1 , is a schematic flowchart of an embodiment of a method for tracing hidden services in the Tor anonymous network provided by the present invention. The traceability method of the hidden service in the Tor anonymous network of the present invention can be but not limited to be used on the attacker's terminal, the method includes step 101 to step 104, and each step is specifically as follows:

[0031] Step 101: Implant several relay nodes in the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method used for tracing hidden service in a Tor anonymous network. A side channel is used to identify a Guard node of Tor hidden service, and the found Guard node and a flowwatermarking technology are used to detect the host IP address set of the suspected Tor hidden service, and finally, an intersection is used to determine the IP address of the hidden service. The technical scheme provided by the invention has higher accuracy, and the position information (IP address) of the Tor anonymous network hidden service can be effectively cracked, and therefore great technical support is provided for joint fight of international and national law enforcement agencies against network crimes, and good feasibility and good practicability are provided.

Description

technical field [0001] The invention relates to the technical field of Internet security, in particular to a method for detecting an entry node of a Tor hidden service. Background technique [0002] With the improvement of Internet users' awareness of privacy protection, Internet users are increasingly pursuing the security, privacy and anonymity of network access. As a major privacy-enhancing technology, anonymous communication technology is widely used in various aspects of the Internet. The existing mechanisms of anonymous communication technology mainly include anonymous and pseudonymous proxy, broadcast and implicit address, anonymous link, onion routing, etc. Typical low-latency anonymous communication systems include Tor, JAP, I2P, etc. [0003] The full name of Tor is "The Second Generation Onion Router", which is currently one of the most popular and widely used low-latency anonymous communication systems. Tor can not only resist attacks such as eavesdropping and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/12
CPCH04L63/0407H04L61/4541
Inventor 方滨兴谭庆丰田志宏殷丽华崔翔
Owner GUANGZHOU UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products