A traceability method for hidden services in tor anonymous network

An anonymous network and network technology, applied in the field of Internet security, can solve the problems of difficult tracking of anonymous service location information and low practicality of tracking and traceability technology, and achieve good feasibility and practicability, high accuracy, and good technology The effect of support

Active Publication Date: 2020-01-14
GUANGZHOU UNIVERSITY
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the high anonymity of the hidden service of the Tor anonymous network, the location information of its anonymous service location is difficult to be tracked, and the existing tracking and tracing technology is less practical

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A traceability method for hidden services in tor anonymous network
  • A traceability method for hidden services in tor anonymous network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0030] see figure 1 , is a schematic flowchart of an embodiment of a method for tracing hidden services in the Tor anonymous network provided by the present invention. The traceability method of the hidden service in the Tor anonymous network of the present invention can be but not limited to be used on the attacker's terminal, the method includes step 101 to step 104, and each step is specifically as follows:

[0031] Step 101: Implant several relay nodes in the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for tracing the source of hidden services in the Tor anonymous network. Firstly, the Guard nodes of the Tor hidden services are identified through side channels, and then the IP address sets of hosts suspected of Tor hidden services are detected by using the discovered Guard nodes and watermark technology. Finally, an intersection attack is used to determine the IP address of the hidden service. The technical scheme of the present invention has higher accuracy, can effectively crack the location information (IP address) of the Tor anonymous network hidden service, provides good technical support for international and domestic law enforcement agencies to jointly combat cybercrime, and has better feasibility sex and practicality.

Description

technical field [0001] The invention relates to the technical field of Internet security, in particular to a method for detecting an entry node of a Tor hidden service. Background technique [0002] With the improvement of Internet users' awareness of privacy protection, Internet users are increasingly pursuing the security, privacy and anonymity of network access. As a major privacy-enhancing technology, anonymous communication technology is widely used in various aspects of the Internet. The existing mechanisms of anonymous communication technology mainly include anonymous and pseudonymous proxy, broadcast and implicit address, anonymous link, onion routing, etc. Typical low-latency anonymous communication systems include Tor, JAP, I2P, etc. [0003] The full name of Tor is "The Second Generation Onion Router", which is currently one of the most popular and widely used low-latency anonymous communication systems. Tor can not only resist attacks such as eavesdropping and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/12
CPCH04L63/0407H04L61/4541
Inventor 方滨兴谭庆丰田志宏殷丽华崔翔
Owner GUANGZHOU UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products