Unlock instant, AI-driven research and patent intelligence for your innovation.

Anonymous network tracing method based on controlled node

A controlled node and anonymous network technology, applied in the field of information security, can solve problems such as destruction

Inactive Publication Date: 2018-11-09
BEIJING INST OF COMP TECH & APPL
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Penetration-based traceability is to use penetration attacks to enter or control nodes in the Tor network, participate in or destroy the communication process, and thus confirm the relevance of the communication. The existing methods require the attacker to control the user to select one or more controlled nodes.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anonymous network tracing method based on controlled node
  • Anonymous network tracing method based on controlled node
  • Anonymous network tracing method based on controlled node

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to make the purpose, content, and advantages of the present invention clearer, the specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0028] figure 1 Shown is the flow chart of the anonymous network traceability method based on the controlled node of the present invention, as figure 1 As shown, a controlled node-based anonymous network traceability method of the present invention includes:

[0029] Step 1: The attacker deploys controlled Tor relay nodes, including:

[0030] Step 1.1: Deploy controlled entry guard nodes;

[0031] The entrance guard node is the first node in the entire Tor anonymous network, and its security is related to the security of the entire communication link and the concealment of the client. In order for the client to choose a controlled entry guard node, the node needs to meet two conditions at the same time. First, the n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an anonymous network tracing method based on a controlled node, and the method comprises the steps: 1, deploying a controlled Tor relay node; 2, adding flowing watermark information to flow before an entrance guard, intercepting the flow between a client and the entrance guard, carrying out the correlation between the flow entering a Tor network and the flow coming out ofthe Tor network, and carrying out the correlation mapping of the client and a server; 3, controlling the client to download all current online relay route information from a directory server, judgingan entrance guard node, a central node and an exit node which may be selected by one client according to an entrance node selection strategy, and carrying out the judgment for one time if there is a request initiated to an entrance guard node set in the requests initiated by the client, so as to determine whether a target address of a connection request is a controlled node or not: repeatedly transmitting resetting messages to the client till the client selects the controlled node if the request target is not the controlled node; 4, controlling the whole route link; 5, recognizing the flowingwatermark, and determining the communication correlation.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to an anonymous network traceability method. Background technique [0002] With the rapid development of the Internet, the network has been integrated into various fields such as military affairs, politics, economy, society, and daily life. While it is convenient for people's lives, data shows that the number of crimes committed by using computer networks is on the rise, and the means of crime tend to be intelligent, professional, and concealed. The emergence of anonymous networks can effectively protect the personal privacy of Internet users, but it also provides convenience for criminals to hide their real network addresses and commit cyber crimes. [0003] TOR is a mainstream anonymous network with more than 10 million users. Ordinary TOR connections generally go through three nodes: entry node, intermediate node, and exit node. The client first random...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L29/06
CPCH04L43/10H04L63/0421
Inventor 贾琼陈志浩庄杰赵磊温泉施雪成吴明杰
Owner BEIJING INST OF COMP TECH & APPL