匿名通信系統(tǒng)指紋攻擊技術研究
發(fā)布時間:2018-04-18 04:00
本文選題:匿名通信系統(tǒng) + 指紋攻擊技術 ; 參考:《北京郵電大學》2017年碩士論文
【摘要】:近年來,網(wǎng)絡空間安全越來越重要且敏感,成為網(wǎng)絡空間科研領域的研究熱點。隱私保護技術作為保障網(wǎng)絡空間安全的重要手段應運而生,匿名通信系統(tǒng)也隨之受到廣泛的關注。如今,學術界針對匿名通信系統(tǒng)提出了多種攻擊技術,用于追蹤匿名通信系統(tǒng)中的發(fā)送者、接收者或發(fā)現(xiàn)兩者之間的通信關系。本文重點研究針對匿名通信系統(tǒng)的指紋攻擊技術。指紋攻擊采用被動的流量分析技術,通過搜集發(fā)送者或接收兩者的特征信息來識別發(fā)送者是否與某一特定的接收者進行通信,特征信息可以是網(wǎng)絡流量特征、路由信息特征以及節(jié)點信息特征等。攻擊者在發(fā)送者與接收者之間搜集兩者通信時的特征信息形成指紋,當再次發(fā)生通信時可以確定發(fā)送者與接收者確實存在著通信關系。本文首先論述了網(wǎng)絡流水印和指紋攻擊的發(fā)展態(tài)勢,簡述了 Tor及I2P匿名通信系統(tǒng)。其次,針對紐約州立大學石溪分校Cai等人提出的CAI指紋攻擊方案的攻擊模型、攻擊過程進行了闡述,對CAI指紋攻擊進行了實驗驗證,設計了相應的數(shù)據(jù)庫存儲指紋方案,完成了典型網(wǎng)站的流量采集工作。最后,論文設計了 MSFA(Mutiple System Fingerpringting Attack)攻擊方案,詳細討論了 MSFA方案的架構設計、流量捕獲模塊設計、獲取數(shù)據(jù)包信息模塊設計、計算編輯距離模塊設計,以及Tor匿名系統(tǒng)環(huán)境下MSFA方案的實現(xiàn)與實驗數(shù)據(jù)處理,并對實驗結果進行了比較分析。
[Abstract]:In recent years, cyberspace security has become more and more important and sensitive, and has become a research hotspot in the field of cyberspace research.Privacy protection technology as an important means to ensure the security of cyberspace emerges as the times require, and anonymous communication system has received extensive attention.Nowadays, a variety of attack techniques are proposed to trace the sender, receiver or discover the communication relationship between the anonymous communication system and the anonymous communication system.This paper focuses on fingerprint attack techniques for anonymous communication systems.The fingerprint attack adopts passive traffic analysis technology to identify whether the sender communicates with a certain receiver by collecting the characteristic information of the sender or receives both. The characteristic information can be a network traffic feature.Routing information features and node information features.The attacker gathers the characteristic information between the sender and the receiver to form a fingerprint, and when the communication occurs again, it can be determined that there is a real communication relationship between the sender and the receiver.In this paper, the development trend of network pipeline printing and fingerprint attack is discussed, and the anonymous communication system of Tor and I2P is briefly described.Secondly, aiming at the attack model of CAI fingerprint attack proposed by Cai et al., State University of New York, the attack process is described, the CAI fingerprint attack is verified experimentally, and the corresponding database storage fingerprint scheme is designed.Completed the flow collection work of typical website.Finally, the thesis designs the MSFA(Mutiple System Fingerpringting attack scheme, discusses the MSFA scheme architecture design, the traffic capture module design, the data packet information module design, the calculation edit distance module design in detail.The implementation of MSFA scheme and experimental data processing under the Tor anonymous system environment are also presented, and the experimental results are compared and analyzed.
【學位授予單位】:北京郵電大學
【學位級別】:碩士
【學位授予年份】:2017
【分類號】:TP393.08
【參考文獻】
相關期刊論文 前1條
1 張連成;王振興;孫建平;;基于時間間隔的擴頻流水印技術[J];計算機應用研究;2011年08期
相關碩士學位論文 前1條
1 郭曉博;匿名P2P網(wǎng)絡的拓撲分析與匿名性評估[D];北京郵電大學;2015年
,本文編號:1766673
本文鏈接:http://sikaile.net/guanlilunwen/ydhl/1766673.html
最近更新
教材專著