检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Jun Cui Changqi Huang Huan Meng Ran Wei
机构地区:[1]School of Life Sciences,Tiangong University,399 Binshui West Road,Xiqing District,Tianjin300387,China [2]Tianjin Engineering Research Center of Biomedical Electronic Technology,Tianjin 300387,China [3]Tianjin Key Laboratory of Quality Control and Evaluation Technology for Medical Devices,Tianjin 300387,China [4]School of Electronics and Information Engineering,Tiangong University,Tianjin 300387,China [5]Department of Rehabilitation Engineering,Bejing College of Social Administration(Training Center of the Ministry of Civil Affairs),Beijing 102600,China
出 处:《Cybersecurity》2024年第4期73-88,共16页网络空间安全科学与技术(英文)
基 金:supported by the Tianjin Education Commission Research Program Project No.2019KJ024.
摘 要:In order to address the shortcomings of traditional anonymity network anonymity evaluation methods,which only analyze from the perspective of the overall network and ignore the attributes of individual nodes,we proposes a dynamic anonymity model based on a self-built anonymous system that combines node attributes,network behavior,and program security monitoring.The anonymity of evaluation nodes is assessed based on stable intervals and behavior baselines defined according to their normal operating status.The anonymity of the network is evaluated using an improved normalized information entropy method that refines anonymity evaluation to the anonymity of each node and expands the dimensionality of evaluation features.This paper compares the effectiveness of our proposed method with static framework information entropy and single indicator methods by evaluating the degree of anonymity provided by a self-built Tor anonymous network under multiple operating scenarios including normal and under attack.Our approach utilizes dynamically changing network anonymity based on multiple anonymous attributes and better reflects the degree of anonymity in anonymous systems.
关 键 词:Node anonymity Behavioral baseline Network anonymity Self-built Tor network Dynamic evaluation
分 类 号:TP393[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:18.118.32.116