期刊文献+

基于Tor的暗网空间资源探测 被引量:13

Darknet Resource Exploring based on Tor
下载PDF
导出
摘要 随着互联网技术的飞速发展,暗网及匿名技术的滥用给网络监管带来了巨大挑战。因此,对暗网空间资源进行探测,具有重要的研究意义和应用价值。简要介绍目前最主流的暗网匿名通信系统Tor,分析其技术原理,设计了一套Tor域名地址采集系统,能够从明网和暗网上分别获取Tor网络资源。同时,通过有选择性地限制洋葱网络中节点所在的地址,有效优化了Tor代理的访问速度,有助于进一步监控和分析Tor网络中的相关内容。 With the rapid development of Internet technology,the abuse of darknet and anonymous technology has brought great challenges to the network regulation.Therefore,It is of great research significance and application value to detect the resources of dark space.The most mainstream dark network anonymous communication system Tor was introduced briefly,its technical principles were analyzed,and a Tor domain name address acquisition system was designed,from the open network and the dark network to obtain Tor network resources.Moreover,through the choice of The restrictions on the location of the node in the onion network effectively optimizes the access speed of the Tor agent,it will be helpful to further monitor and analyze the content of Tor in the future.
出处 《通信技术》 2017年第10期2304-2309,共6页 Communications Technology
关键词 暗网 洋葱路由网络 域名地址 资源探测 darknet Tor domain resource detection
  • 相关文献

参考文献5

二级参考文献20

  • 1王啸,时金桥,贺龙涛.T0r主动测量的设计与分析[C].中国第一届网络攻防与系统安全会议(NADSS2010).北京:[出版社不详],2010:2-4. 被引量:1
  • 2DINGLEDINE R, MATHEWSON N. Anonymity Loves Company: Usability and the Network Effect[C]//Designing Security Systems That People Can Use. US: O'Reilly Media, 2005: 15-17. 被引量:1
  • 3DINGLEDINE R, MATHEWSON N, SYVERSON P. Tor: The Second-generation Onion Router[C]//Proceedings of the 13th USENIX Security Symposium (USENIX Security'04). Berkeley: [s.n.], 2004: 3-5. 被引量:1
  • 4LING Zhen, LUO Junzhou, YU Wei. A New Cell Counter based Attack against Tor[C]//Proceedings of the 16th ACM Conference on Computer and Communications Security. [s.1.]: ACM, 2009: 578-589. 被引量:1
  • 5BAUER K, MCCOY D, GRUNWALD D, et al. Low-resource Routing Attacks against Anonymous Systems[C]//Proceedings of the 2007 Workshop on Privacy in the Electronic Society(WPES). Washington, DC: [s.n.], 2007: 2-3. 被引量:1
  • 6王育民,通信网的安全.理论与技术,1999年 被引量:1
  • 7Bao F,Proc 1st Int Workshop on Practice and Theoryin Public Key Cryptography,1998年,55页 被引量:1
  • 8DINGLEDINE R,MATHEWSON N,SYVERSON P.Tor:the second-generation onion router. . 2004 被引量:1
  • 9Clement Guitton.??A review of the available content on Tor hidden services: The case against further development(J)Computers in Human Behavior . 2013 (6) 被引量:1
  • 10Lenhard J,Loesing K,Wirtz G.Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks. Lecture Notes in Computer Science . 2009 被引量:1

共引文献20

同被引文献79

引证文献13

二级引证文献59

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部