基于Tor的反向匿名信道建立技術(shù)研究
發(fā)布時(shí)間:2018-11-26 19:58
【摘要】:隨著互聯(lián)網(wǎng)日益深入人們的生活,網(wǎng)絡(luò)匿名通信技術(shù)成為保障人們網(wǎng)絡(luò)隱私的重要手段。這類技術(shù)幫助人們隱藏自身的具體身份,從而推動(dòng)那些不想透露個(gè)人身份信息的人參與到特殊的網(wǎng)絡(luò)活動(dòng)之中。而Tor匿名通信系統(tǒng)是現(xiàn)今最為實(shí)用和有效的匿名通信系統(tǒng),對(duì)其的研究是當(dāng)今網(wǎng)絡(luò)安全領(lǐng)域的一個(gè)熱點(diǎn)。 本文提出了基于Tor匿名通信系統(tǒng)的反向匿名信道建立技術(shù),用以拓展Tor匿名通信系統(tǒng)的HiddenService協(xié)議,,以提供更加安全和高效的能夠保證通信雙方匿名性的通信機(jī)制。本文的主要工作如下: 首先,本文簡(jiǎn)單介紹了Tor匿名通信系統(tǒng)的工作流程、相關(guān)協(xié)議和網(wǎng)絡(luò)仿真。具體介紹了如何在私有網(wǎng)絡(luò)內(nèi)成功仿真Tor匿名通信系統(tǒng),且額外給出了兩種局域網(wǎng)仿真的方法。 其次,本文針對(duì)Tor源碼進(jìn)行了詳細(xì)的分析。具體介紹了Tor源碼的依賴庫(kù),并詳細(xì)分析了Tor源碼的重要組件以及程序核心工作流程。 再次,本文提出了反向匿名信道建立技術(shù)。基于Tor匿名通信系統(tǒng)之中的HiddenService協(xié)議進(jìn)行拓展,設(shè)計(jì)了反向匿名信道建立的基本方案。 最后,本文對(duì)HiddenService原始協(xié)議與其拓展協(xié)議進(jìn)行了局域網(wǎng)和互聯(lián)網(wǎng)的對(duì)比實(shí)驗(yàn)。通過對(duì)比實(shí)驗(yàn),實(shí)際測(cè)量驗(yàn)證了HiddenService拓展協(xié)議比原始協(xié)議在效率上的提高,并分析說明了拓展協(xié)議比原始協(xié)議在安全性上的提高。
[Abstract]:With the development of Internet, anonymous communication technology has become an important means to protect people's privacy. Such technologies help people hide their identity and promote the participation of those who do not want to disclose their personal identity into specific online activities. Tor anonymous communication system is the most practical and effective anonymous communication system, and its research is a hot spot in the field of network security. In this paper, a reverse anonymous channel building technique based on Tor anonymous communication system is proposed to extend the HiddenService protocol of Tor anonymous communication system, so as to provide a more secure and efficient communication mechanism that can guarantee the anonymity of both communication parties. The main work of this paper is as follows: first, this paper briefly introduces the workflow of Tor anonymous communication system, related protocols and network simulation. This paper introduces how to simulate Tor anonymous communication system successfully in private network, and gives two methods of LAN simulation. Secondly, this article carries on the detailed analysis to the Tor source code. The dependence library of Tor source code is introduced in detail, and the important components of Tor source code and the core workflow of the program are analyzed in detail. Thirdly, this paper puts forward the technology of setting up reverse anonymous channel. Based on the extension of HiddenService protocol in Tor anonymous communication system, the basic scheme of setting up reverse anonymous channel is designed. Finally, the HiddenService protocol and its extension protocol are compared with LAN and Internet. Through the comparison experiment, the efficiency of the HiddenService extension protocol is proved to be higher than that of the original protocol, and the improvement of the security of the extension protocol compared with the original protocol is analyzed.
【學(xué)位授予單位】:西安電子科技大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2014
【分類號(hào)】:TP393.08
本文編號(hào):2359483
[Abstract]:With the development of Internet, anonymous communication technology has become an important means to protect people's privacy. Such technologies help people hide their identity and promote the participation of those who do not want to disclose their personal identity into specific online activities. Tor anonymous communication system is the most practical and effective anonymous communication system, and its research is a hot spot in the field of network security. In this paper, a reverse anonymous channel building technique based on Tor anonymous communication system is proposed to extend the HiddenService protocol of Tor anonymous communication system, so as to provide a more secure and efficient communication mechanism that can guarantee the anonymity of both communication parties. The main work of this paper is as follows: first, this paper briefly introduces the workflow of Tor anonymous communication system, related protocols and network simulation. This paper introduces how to simulate Tor anonymous communication system successfully in private network, and gives two methods of LAN simulation. Secondly, this article carries on the detailed analysis to the Tor source code. The dependence library of Tor source code is introduced in detail, and the important components of Tor source code and the core workflow of the program are analyzed in detail. Thirdly, this paper puts forward the technology of setting up reverse anonymous channel. Based on the extension of HiddenService protocol in Tor anonymous communication system, the basic scheme of setting up reverse anonymous channel is designed. Finally, the HiddenService protocol and its extension protocol are compared with LAN and Internet. Through the comparison experiment, the efficiency of the HiddenService extension protocol is proved to be higher than that of the original protocol, and the improvement of the security of the extension protocol compared with the original protocol is analyzed.
【學(xué)位授予單位】:西安電子科技大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2014
【分類號(hào)】:TP393.08
【參考文獻(xiàn)】
相關(guān)期刊論文 前2條
1 劉鑫;王能;;匿名通信綜述[J];計(jì)算機(jī)應(yīng)用;2010年03期
2 楊元原;馬文平;白曉峰;;一種混合的Tor匿名通信系統(tǒng)[J];計(jì)算機(jī)應(yīng)用研究;2007年10期
本文編號(hào):2359483
本文鏈接:http://sikaile.net/guanlilunwen/ydhl/2359483.html
最近更新
教材專著