全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

匿名网络Tor与I2P关键技术研究
Research on Key Technologies of Anonymous Network Tor and I2P

DOI: 10.12677/CSA.2019.97146, PP. 1296-1308

Keywords: 匿名网络,Tor,I2P,洋葱路由,大蒜路由
Anonymous Network
, Tor, I2P, Onion Routing, Garlic Routing

Full-Text   Cite this paper   Add to My Lib

Abstract:

多层加密匿名网络旨在通过将用户与其最终目的地分离来为用户提供匿名和隐藏服务,Tor (The Onion Router)和I2P (Invisible Internet project)都是多层加密匿名网络,目前已受到学术界、工业界的高度重视,也受到用户的欢迎。但Tor和I2P之间由于其设计理念上存在差别,因此其网络关键技术存在明显差异,这些差异主要体现在网络体系结构、网络管理、接口技术、交换技术、路由技术、密码规格、节点选择与发现等方面。通过对匿名网络Tor、I2P的关键技术进行比较分析和研究,可以全面理解Tor和I2P网络的工作原理,了解两种网络各自的技术特点和匿名性与安全性上存在的问题,为Tor和I2P的去匿名化和网络测量等研究奠定基础。
Multi-layered encrypted anonymous networks are designed to provide anonymous and hidden services to users by separating users from their final destination. Tor (The Onion Router) and I2P (Invisible Internet Project) are multi-layer encrypted anonymous networks, which have been highly valued by academics and industry, and are also welcomed by users. However, due to the distinction in design concept between Tor and I2P, there are obvious differences in the key technologies of the network. These differences are mainly reflected in the network architecture, network management, interface technology, switching technology, routing technology, password specification, node selection and discovery. Through the comparative analysis and research on the key technologies of Tor and I2P, the working principle of Tor and I2P networks can be comprehensively understood, and the technical characteristics, anonymity and security problems of the two kinds of networks can be understood as well, so as to lay a foundation for the research on Tor and I2P’s de-anonymity and network measurement.

References

[1]  周彦伟, 杨启良, 杨波, 吴振强. 一种安全性增强的Tor匿名通信系统[J]. 计算机研究与发展, 2014, 51(7): 1538-1546.
[2]  高俊杰. I2P匿名通信系统优化与实现[D]: [硕士学位论文]. 北京: 北京大学, 2014.
[3]  Montieri, A., Ciuonzo, D., Aceto, G. and Pescapé, A. (2017) Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark. 2017 29th International Teletraffic Congress (ITC 29), Genoa, 81-89.
[4]  周勇. 基于Tor的匿名通信研究[D]: [硕士学位论文]. 西安: 西安电子科技大学, 2013.
[5]  罗军舟, 杨明, 凌振, 吴文甲, 顾晓丹. 匿名通信与暗网研究综述[J]. 计算机研究与发展, 2019, 56(1): 103-130.
[6]  Ali, A., Khan, M., Saddique, M., Pirzada, U., Zohaib, M., Ahmad, I. and Debnath, N. (2016) TORvs I2P: A Comparative Study. Proceedings of the 2016 IEEE International Conference on Industrial Technology, Taipei, 14-17 March 2016, 3.
[7]  王有文. 第二代洋葱路由匿名系统Tor的性能改进研究[D]: [硕士学位论文]. 北京: 北京邮电大学, 2017.
[8]  Conrad, B. and Shirazi, F. (2014) A Survey on Tor and I2P. ICIMP 2014: The Ninth International Conference on Internet Monitoring and Protection, Paris, 20-24 July 2014, 20.
[9]  Timpanaro, J.P., Cholez, T., Chrisment, I. and Festor, O. (2015) Evaluation of the Anonymous I2P Network’s Design Choices against Performance and Security. ICISSP 2015-Proceedings of the 1st International Conference on Information Systems Se-curity and Privacy, Angers, France, 9-11 February 2015, 46-55.
[10]  Müller, J. (2016) Analysis of the I2P Network-Information Gathering and Attack Evaluations. Bachelors Thesis, Bern University of Applied Sciences, Bern, Biel, Burgdorf.
[11]  Vashi, D. and Khilari, G. (2015) Performance Improvement in I2P Using SSL. International Journal of Science, Engineering and Technology Re-search, 4, 1454-1456.
[12]  Shahbar, K. (2017) Analysis of Multilayer-Encryption Anonymity Networks. Ph.D. Thesis, Dalhousie University Halifax, Nova Scotia.
[13]  Biryukov, A., Pustogarov, I. and Weinmann, R.-P. (2013) Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization. 2013 IEEE Symposium on Security and Privacy, Berkeley, CA, 19-22 May 2013, 80-94.
https://doi.org/10.1109/SP.2013.15
[14]  Biryukov, A., Thill, F., Pustogarov, I. and Weinmann, R.-P. (2014) Content and Popu-larity Analysis of Tor Hidden Services. 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops, Ma-drid, Spain, 30 June-3 July 2014, 188-193.
https://doi.org/10.1109/ICDCSW.2014.20
[15]  Casenove, M. and Miraglia, A. (2014) Botnet over Tor: The Illusion of Hiding. 2014 6th International Conference on Cyber Conflict, Tallinn, Estonia, 3-6 June 2014, 273-282.
https://doi.org/10.1109/CYCON.2014.6916408
[16]  Astolfi, F., Kroese, J. and Van Oorschot, J. (2015) I2P-The In-visible Internet Project. Media Technology, Leiden University Web Technology Report.
[17]  Timpanaro, J.P., Cholez, T., Chrisment, I. and Festor, O. (2015) Evaluation of the Anonymous I2P Network’s Design Choices against Performance and Security. 2015 Interna-tional Conference on Information Systems Security and Privacy, Angers, France, 9-11 February 2015, 9.
[18]  Karthigeyan, A., Rob-inson Joel, M., Manikandan, S.P., Raja Guru, P. and Raman, S. (2014) A Comprehensive Behavior Analysis of TOR versus I2P. In-ternational Journal of Applied Engineering Research, 9, 73337345.
[19]  Lin, Y., Yu, X.Z., Zhao, J., Zhan, D.Y., Du, X.J. and Guiz-Ani, M. (2018) Deciding Your Own Anonymity: User-Oriented Node Selection in I2P. IEEE Access, 6, 71350-71359.
https://doi.org/10.1109/ACCESS.2018.2881719
[20]  Egger, C., Schlumberger, J., Kruegel, C. and Vigna, G. (2013) Practical Attacks against the I2P Network. In: Stolfo, S.J., Stavrou, A. and Wright, C.V., Eds., Research in Attacks, Intrusions, and Defenses. RAID 2013. Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, 432-451.
https://doi.org/10.1007/978-3-642-41284-4_22
[21]  Timpanaro, J.P., Cholez, T., Chrisment, I. and Festor, O. (2015) Evaluation of the Anonymous I2PNetwork’s Design Choices against Performance and Security. TELECOM Nancy Universite’ de Lorraine INRIA/LORIA, France.
[22]  Timpanaro, J.P., Chrisment, I. and Festor, O. (2011) Monitoring the I2P Network.
https://hal.inria.fr/hal-00653136

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133