匿名通信系统指纹攻击技术研究
发布时间:2018-04-18 04:00
本文选题:匿名通信系统 + 指纹攻击技术 ; 参考:《北京邮电大学》2017年硕士论文
【摘要】:近年来,网络空间安全越来越重要且敏感,成为网络空间科研领域的研究热点。隐私保护技术作为保障网络空间安全的重要手段应运而生,匿名通信系统也随之受到广泛的关注。如今,学术界针对匿名通信系统提出了多种攻击技术,用于追踪匿名通信系统中的发送者、接收者或发现两者之间的通信关系。本文重点研究针对匿名通信系统的指纹攻击技术。指纹攻击采用被动的流量分析技术,通过搜集发送者或接收两者的特征信息来识别发送者是否与某一特定的接收者进行通信,特征信息可以是网络流量特征、路由信息特征以及节点信息特征等。攻击者在发送者与接收者之间搜集两者通信时的特征信息形成指纹,当再次发生通信时可以确定发送者与接收者确实存在着通信关系。本文首先论述了网络流水印和指纹攻击的发展态势,简述了 Tor及I2P匿名通信系统。其次,针对纽约州立大学石溪分校Cai等人提出的CAI指纹攻击方案的攻击模型、攻击过程进行了阐述,对CAI指纹攻击进行了实验验证,设计了相应的数据库存储指纹方案,完成了典型网站的流量采集工作。最后,论文设计了 MSFA(Mutiple System Fingerpringting Attack)攻击方案,详细讨论了 MSFA方案的架构设计、流量捕获模块设计、获取数据包信息模块设计、计算编辑距离模块设计,以及Tor匿名系统环境下MSFA方案的实现与实验数据处理,并对实验结果进行了比较分析。
[Abstract]:In recent years, cyberspace security has become more and more important and sensitive, and has become a research hotspot in the field of cyberspace research.Privacy protection technology as an important means to ensure the security of cyberspace emerges as the times require, and anonymous communication system has received extensive attention.Nowadays, a variety of attack techniques are proposed to trace the sender, receiver or discover the communication relationship between the anonymous communication system and the anonymous communication system.This paper focuses on fingerprint attack techniques for anonymous communication systems.The fingerprint attack adopts passive traffic analysis technology to identify whether the sender communicates with a certain receiver by collecting the characteristic information of the sender or receives both. The characteristic information can be a network traffic feature.Routing information features and node information features.The attacker gathers the characteristic information between the sender and the receiver to form a fingerprint, and when the communication occurs again, it can be determined that there is a real communication relationship between the sender and the receiver.In this paper, the development trend of network pipeline printing and fingerprint attack is discussed, and the anonymous communication system of Tor and I2P is briefly described.Secondly, aiming at the attack model of CAI fingerprint attack proposed by Cai et al., State University of New York, the attack process is described, the CAI fingerprint attack is verified experimentally, and the corresponding database storage fingerprint scheme is designed.Completed the flow collection work of typical website.Finally, the thesis designs the MSFA(Mutiple System Fingerpringting attack scheme, discusses the MSFA scheme architecture design, the traffic capture module design, the data packet information module design, the calculation edit distance module design in detail.The implementation of MSFA scheme and experimental data processing under the Tor anonymous system environment are also presented, and the experimental results are compared and analyzed.
【学位授予单位】:北京邮电大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:TP393.08
【参考文献】
相关期刊论文 前1条
1 张连成;王振兴;孙建平;;基于时间间隔的扩频流水印技术[J];计算机应用研究;2011年08期
相关硕士学位论文 前1条
1 郭晓博;匿名P2P网络的拓扑分析与匿名性评估[D];北京邮电大学;2015年
,本文编号:1766673
本文链接:https://www.wllwen.com/guanlilunwen/ydhl/1766673.html