检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:杨宏宇 宋成瑜[2] 王朋 赵永康 胡泽 成翔 张良 YANG Hongyu;SONG Chengyu;WANG Peng;ZHAO Yongkang;HU Ze;CHENG Xiang;ZHANG Liang(School of Safety Science and Engineering,Civil Aviation University of China,Tianjin 300300,China;School of Computer Science and Technology,Civil Aviation University of China,Tianjin 300300,China;School of Information Engineering,Yangzhou University,Yangzhou 225127,China;Information Security Evaluation Center of Civil Aviation,Civil Aviation University of China,Tianjin 300300,China;School of Information,The University of Arizona,Tucson 85721,USA)
机构地区:[1]中国民航大学安全科学与工程学院,天津300300 [2]中国民航大学计算机科学与技术学院,天津300300 [3]扬州大学信息工程学院,扬州225127 [4]中国民航大学民航信息安全评估中心,天津300300 [5]亚利桑那大学信息学院,图森85721
出 处:《电子与信息学报》2024年第9期3474-3489,共16页Journal of Electronics & Information Technology
基 金:国家自然科学基金(62201576,U1833107);江苏省基础研究计划自然科学基金青年基金(BK20230558);国家自然科学基金配套基金(3122023PT10)。
摘 要:以洋葱路由器(Tor)为代表的匿名网络是目前使用最广泛的加密通信网络之一,违法分子利用加密网络以掩盖其违法行为,给网络监管和网络安全带来极大的挑战。网站指纹攻击技术的出现使得对加密流量的分析成为可能,监管者利用数据包方向等信息对Tor流量进行解密,推断用户正在访问的网页。该文对Tor网站指纹攻击与防御方法进行了调研和分析。首先,对Tor网站指纹攻击的相关技术进行总结与比较,重点分析基于传统机器学习和深度学习的Tor网站指纹攻击;其次,对目前多种防御方法进行全面调研和分析;针对现有Tor网站指纹攻击方法存在的局限性进行分析和总结,展望未来发展方向和前景。The anonymity network represented by The onion router(Tor)is one of the most widely used encrypted communication networks,criminals utilize encrypted networks to conceal their illegal activities,posing significant challenges to network regulation and cybersecurity.The emergence of website fingerprinting attack has made the analysis of encrypted traffic possible,enabling supervisors to identify Tor traffic and infer the web pages being visited by users by utilizing features such as packet direction and so on.In this paper,a wide survey and analysis of website fingerprinting attack and defense methods on Tor are conducted.Firstly,relevant techniques of website fingerprinting attacks on Tor are summarized and compared.The emphasis is placed on website fingerprinting attacks based on traditional machine learning and deep learning technologies.Secondly,a comprehensive survey and analysis of various existing defense methods are conducted.The limitations in the field of website fingerprinting attack methods on Tor are analyzed and summarized,and the future development directions and prospects are looked forward to.
关 键 词:Tor匿名网络 网站指纹攻击 流量分析 隐私保护 网络监管
分 类 号:TN915.08[电子电信—通信与信息系统] TP393[电子电信—信息与通信工程]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:18.188.100.195