Tracing method of Tor network

A network and data packet technology, applied in the darknet field, can solve the problems of network crime investigation and tracking difficulties, etc.

Active Publication Date: 2019-03-29
BEIJING INST OF COMP TECH & APPL
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The main purpose of the dark web is to deliberate user identity and communication data information. However, anonymous network communication technology is a double-edged sword, because it not only protects the privacy of normal users, but also brings great challenges to the investigation and tracking of cybercrime. difficulties and severe challenges

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Tracing method of Tor network
  • Tracing method of Tor network
  • Tracing method of Tor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] In order to make the purpose, content, and advantages of the present invention clearer, the specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0013] Figure 1a Shown is the Tor Control Element packet format diagram, Figure 1b Shown is a schematic diagram of the Tor forwarding element data packet format, such as Figure 1a as well as Figure 1b As shown, in the Tor network, the client needs to go through three onion routers to access the server (the English used on the official website is Onion Router), which are the entry node, intermediate node, and exit node, which can be called three hops. Six jumps. The client and the server establish an encrypted communication path after three or six hops, which can be called a Tor link (the English used on the official website is circuit). The data field part of the data packet transmitted on the Tor link is 512 byt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a tracing method of a Tor network. The method includes: initially determining an anonymous server, wherein the steps include initiating an access to the anonymous server through a controlled client, obtaining information of a server introduce node from a directory server, establishing Tor link connection with the introduce node, and creating Tor link connection by the controlled client with a controlled appointment node; and initially judging an anonymous server IP address if all received element data packets are sorted, time stamps conform to a rule of an ascending order, and link ID numbers of 5 protocol feature data packets are also the same. The method can destroy anonymity of the anonymous server, and obtain real address information of a service provider to achieve a regulatory purpose.

Description

technical field [0001] The present invention relates to darknet technology, in particular to a source tracing method of Tor network. Background technique [0002] The main purpose of the dark web is to deliberate user identity and communication data information. However, anonymous network communication technology is a double-edged sword, because it not only protects the privacy of normal users, but also brings great challenges to the investigation and tracking of cybercrime. difficulties and severe challenges. Malicious organizations or users conduct some illegal and criminal network activities through the anonymous system. Supervision of the anonymous network will be urgent, there is no absolute "free world", it cannot be left alone, it must be controlled. Onion routing-Tor is the most famous anonymous network application, using onion routing technology as an anonymous system implementation technology to build an anonymous communication system is the most widely used. C...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L29/06
CPCH04L43/10H04L63/30
Inventor 王硕单联强夏旸刘康涛
Owner BEIJING INST OF COMP TECH & APPL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products