|
匿名网络Tor与I2P关键技术研究
|
Abstract:
[1] | 周彦伟, 杨启良, 杨波, 吴振强. 一种安全性增强的Tor匿名通信系统[J]. 计算机研究与发展, 2014, 51(7): 1538-1546. |
[2] | 高俊杰. I2P匿名通信系统优化与实现[D]: [硕士学位论文]. 北京: 北京大学, 2014. |
[3] | Montieri, A., Ciuonzo, D., Aceto, G. and Pescapé, A. (2017) Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark. 2017 29th International Teletraffic Congress (ITC 29), Genoa, 81-89. |
[4] | 周勇. 基于Tor的匿名通信研究[D]: [硕士学位论文]. 西安: 西安电子科技大学, 2013. |
[5] | 罗军舟, 杨明, 凌振, 吴文甲, 顾晓丹. 匿名通信与暗网研究综述[J]. 计算机研究与发展, 2019, 56(1): 103-130. |
[6] | Ali, A., Khan, M., Saddique, M., Pirzada, U., Zohaib, M., Ahmad, I. and Debnath, N. (2016) TORvs I2P: A Comparative Study. Proceedings of the 2016 IEEE International Conference on Industrial Technology, Taipei, 14-17 March 2016, 3. |
[7] | 王有文. 第二代洋葱路由匿名系统Tor的性能改进研究[D]: [硕士学位论文]. 北京: 北京邮电大学, 2017. |
[8] | Conrad, B. and Shirazi, F. (2014) A Survey on Tor and I2P. ICIMP 2014: The Ninth International Conference on Internet Monitoring and Protection, Paris, 20-24 July 2014, 20. |
[9] | Timpanaro, J.P., Cholez, T., Chrisment, I. and Festor, O. (2015) Evaluation of the Anonymous I2P Network’s Design Choices against Performance and Security. ICISSP 2015-Proceedings of the 1st International Conference on Information Systems Se-curity and Privacy, Angers, France, 9-11 February 2015, 46-55. |
[10] | Müller, J. (2016) Analysis of the I2P Network-Information Gathering and Attack Evaluations. Bachelors Thesis, Bern University of Applied Sciences, Bern, Biel, Burgdorf. |
[11] | Vashi, D. and Khilari, G. (2015) Performance Improvement in I2P Using SSL. International Journal of Science, Engineering and Technology Re-search, 4, 1454-1456. |
[12] | Shahbar, K. (2017) Analysis of Multilayer-Encryption Anonymity Networks. Ph.D. Thesis, Dalhousie University Halifax, Nova Scotia. |
[13] | Biryukov, A., Pustogarov, I. and Weinmann, R.-P. (2013) Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization. 2013 IEEE Symposium on Security and Privacy, Berkeley, CA, 19-22 May 2013, 80-94.
https://doi.org/10.1109/SP.2013.15 |
[14] | Biryukov, A., Thill, F., Pustogarov, I. and Weinmann, R.-P. (2014) Content and Popu-larity Analysis of Tor Hidden Services. 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops, Ma-drid, Spain, 30 June-3 July 2014, 188-193. https://doi.org/10.1109/ICDCSW.2014.20 |
[15] | Casenove, M. and Miraglia, A. (2014) Botnet over Tor: The Illusion of Hiding. 2014 6th International Conference on Cyber Conflict, Tallinn, Estonia, 3-6 June 2014, 273-282. https://doi.org/10.1109/CYCON.2014.6916408 |
[16] | Astolfi, F., Kroese, J. and Van Oorschot, J. (2015) I2P-The In-visible Internet Project. Media Technology, Leiden University Web Technology Report. |
[17] | Timpanaro, J.P., Cholez, T., Chrisment, I. and Festor, O. (2015) Evaluation of the Anonymous I2P Network’s Design Choices against Performance and Security. 2015 Interna-tional Conference on Information Systems Security and Privacy, Angers, France, 9-11 February 2015, 9. |
[18] | Karthigeyan, A., Rob-inson Joel, M., Manikandan, S.P., Raja Guru, P. and Raman, S. (2014) A Comprehensive Behavior Analysis of TOR versus I2P. In-ternational Journal of Applied Engineering Research, 9, 73337345. |
[19] | Lin, Y., Yu, X.Z., Zhao, J., Zhan, D.Y., Du, X.J. and Guiz-Ani, M. (2018) Deciding Your Own Anonymity: User-Oriented Node Selection in I2P. IEEE Access, 6, 71350-71359. https://doi.org/10.1109/ACCESS.2018.2881719 |
[20] | Egger, C., Schlumberger, J., Kruegel, C. and Vigna, G. (2013) Practical Attacks against the I2P Network. In: Stolfo, S.J., Stavrou, A. and Wright, C.V., Eds., Research in Attacks, Intrusions, and Defenses. RAID 2013. Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, 432-451. https://doi.org/10.1007/978-3-642-41284-4_22 |
[21] | Timpanaro, J.P., Cholez, T., Chrisment, I. and Festor, O. (2015) Evaluation of the Anonymous I2PNetwork’s Design Choices against Performance and Security. TELECOM Nancy Universite’ de Lorraine INRIA/LORIA, France. |
[22] | Timpanaro, J.P., Chrisment, I. and Festor, O. (2011) Monitoring the I2P Network. https://hal.inria.fr/hal-00653136 |