论文标题

对TOR的匿名攻击:调查

De-anonymisation attacks on Tor: A Survey

论文作者

Karunanayake, Ishan, Ahmed, Nadeem, Malaney, Robert, Islam, Rafiqul, Jha, Sanjay

论文摘要

随着越来越多的用户试图保护其在线隐私,匿名网络在当今的在线世界中变得越来越流行。 TOR是目前最受欢迎的匿名网络,并为用户和服务(隐藏服务)提供了匿名性。但是,Tor提供的匿名性也以各种方式被滥用。托管用于销售毒品,托管命令和控制服务器的非法站点以及进行审查的内容分发,只是一些这样的例子。结果,包括政府和执法机构在内的各方都对攻击感兴趣,这些攻击有助于匿名化TOR网络,破坏其运营并绕开其审查机制。在本调查文件中,我们回顾了已知的TOR攻击,并确定了当前的TOR用户和隐藏服务的匿名化技术。我们讨论这些技术并分析其执行方法的实用性。最后,我们讨论了对TOR框架的改进,以防止被调查的匿名攻击。

Anonymity networks are becoming increasingly popular in today's online world as more users attempt to safeguard their online privacy. Tor is currently the most popular anonymity network in use and provides anonymity to both users and services (hidden services). However, the anonymity provided by Tor is also being misused in various ways. Hosting illegal sites for selling drugs, hosting command and control servers for botnets, and distributing censored content are but a few such examples. As a result, various parties, including governments and law enforcement agencies, are interested in attacks that assist in de-anonymising the Tor network, disrupting its operations, and bypassing its censorship circumvention mechanisms. In this survey paper, we review known Tor attacks and identify current techniques for the de-anonymisation of Tor users and hidden services. We discuss these techniques and analyse the practicality of their execution method. We conclude by discussing improvements to the Tor framework that help prevent the surveyed de-anonymisation attacks.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源