洋葱路由器网站指纹攻击与防御研究综述  

Website Fingerprinting Attacks and Defenses on Tor:A Survey

在线阅读下载全文

作  者:杨宏宇 宋成瑜[2] 王朋 赵永康 胡泽 成翔 张良 YANG Hongyu;SONG Chengyu;WANG Peng;ZHAO Yongkang;HU Ze;CHENG Xiang;ZHANG Liang(School of Safety Science and Engineering,Civil Aviation University of China,Tianjin 300300,China;School of Computer Science and Technology,Civil Aviation University of China,Tianjin 300300,China;School of Information Engineering,Yangzhou University,Yangzhou 225127,China;Information Security Evaluation Center of Civil Aviation,Civil Aviation University of China,Tianjin 300300,China;School of Information,The University of Arizona,Tucson 85721,USA)

机构地区:[1]中国民航大学安全科学与工程学院,天津300300 [2]中国民航大学计算机科学与技术学院,天津300300 [3]扬州大学信息工程学院,扬州225127 [4]中国民航大学民航信息安全评估中心,天津300300 [5]亚利桑那大学信息学院,图森85721

出  处:《电子与信息学报》2024年第9期3474-3489,共16页Journal of Electronics & Information Technology

基  金:国家自然科学基金(62201576,U1833107);江苏省基础研究计划自然科学基金青年基金(BK20230558);国家自然科学基金配套基金(3122023PT10)。

摘  要:以洋葱路由器(Tor)为代表的匿名网络是目前使用最广泛的加密通信网络之一,违法分子利用加密网络以掩盖其违法行为,给网络监管和网络安全带来极大的挑战。网站指纹攻击技术的出现使得对加密流量的分析成为可能,监管者利用数据包方向等信息对Tor流量进行解密,推断用户正在访问的网页。该文对Tor网站指纹攻击与防御方法进行了调研和分析。首先,对Tor网站指纹攻击的相关技术进行总结与比较,重点分析基于传统机器学习和深度学习的Tor网站指纹攻击;其次,对目前多种防御方法进行全面调研和分析;针对现有Tor网站指纹攻击方法存在的局限性进行分析和总结,展望未来发展方向和前景。The anonymity network represented by The onion router(Tor)is one of the most widely used encrypted communication networks,criminals utilize encrypted networks to conceal their illegal activities,posing significant challenges to network regulation and cybersecurity.The emergence of website fingerprinting attack has made the analysis of encrypted traffic possible,enabling supervisors to identify Tor traffic and infer the web pages being visited by users by utilizing features such as packet direction and so on.In this paper,a wide survey and analysis of website fingerprinting attack and defense methods on Tor are conducted.Firstly,relevant techniques of website fingerprinting attacks on Tor are summarized and compared.The emphasis is placed on website fingerprinting attacks based on traditional machine learning and deep learning technologies.Secondly,a comprehensive survey and analysis of various existing defense methods are conducted.The limitations in the field of website fingerprinting attack methods on Tor are analyzed and summarized,and the future development directions and prospects are looked forward to.

关 键 词:Tor匿名网络 网站指纹攻击 流量分析 隐私保护 网络监管 

分 类 号:TN915.08[电子电信—通信与信息系统] TP393[电子电信—信息与通信工程]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象