作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2021, Vol. 47 ›› Issue (11): 136-143. doi: 10.19678/j.issn.1000-3428.0059447

• 网络空间安全 • 上一篇    下一篇

面向端到端溯源攻击对手的Tor安全性模型

王琦, 曹卫权, 梁杰, 李赟, 吴杰   

  1. 盲信号处理国家级重点实验室, 成都 610041
  • 收稿日期:2020-09-07 修回日期:2020-10-31 发布日期:2020-11-19
  • 作者简介:王琦(1990-),男,硕士研究生,主研方向为匿名通信安全;曹卫权,助理研究员、博士;梁杰,硕士;李赟,助理研究员、博士;吴杰,高级工程师、博士。
  • 基金资助:
    国防科技重点实验室基金(614241303071913)。

Tor Security Model for End-to-End Source Tracking Attack Adversary

WANG Qi, CAO Weiquan, LIANG Jie, LI Yun, WU Jie   

  1. National Key Laboratory of Science and Technology on Blind Signal Processing, Chengdu 610041, China
  • Received:2020-09-07 Revised:2020-10-31 Published:2020-11-19

摘要: Tor匿名通信系统在全球范围内被广泛部署与使用,但其抵御溯源攻击的能力有待进一步建模分析。为精确衡量Tor用户在端到端溯源攻击下的安全性,综合Tor节点选择算法、用户使用模式、溯源攻击对手能力等要素,建立针对端到端溯源攻击对手的Tor安全性模型。经实验验证与分析结果表明,该模型可在统计意义下较精确计算对手捕获通信链路的概率及次数,以此衡量不同端到端溯源攻击对手对用户安全性的破坏程度。

关键词: 洋葱路由器, 端到端溯源攻击对手, 安全性模型, 节点选择算法, 用户安全性

Abstract: The Tor anonymous communication system is deployed and used globally,but its ability to resist source tracking attacks needs further modeling for analysis.In order to measure the security of Tor users under end-to-end source tracking attacks,a Tor security model is proposed,which considers multiple factors such as Tor node selection algorithm,user usage patterns and the ability of source tracking attack adversaries.The results of experimental verification and effectiveness analysis show that the proposed model can accurately calculate the probability and number of times that the attack adversaries capture the communication link.On this basis,it can measure the degree of damage to user security by different end-to-end source attack adversaries.

Key words: The onion router(Tor), end-to-end source tracking attack adversary, security model, node selection algorithm, user security

中图分类号: