Tor(theonionrouter)是部署最多的匿名通信系统,提供在线匿名和隐私保护,而隐形互联网I2P(invisible Internet project)允许应用程序通过使用大蒜路由,以匿名和安全方式相互发送消息。匿名网络Tor和I2P目前已受到学术界、工业界的高度重...Tor(theonionrouter)是部署最多的匿名通信系统,提供在线匿名和隐私保护,而隐形互联网I2P(invisible Internet project)允许应用程序通过使用大蒜路由,以匿名和安全方式相互发送消息。匿名网络Tor和I2P目前已受到学术界、工业界的高度重视,也受到用户的欢迎。网络Tor和I2P之间的设计理念区别关键在于:I2P试图将现有的互联网服务转移到I2P网络,并在框架内提供服务实现,而Tor则允许匿名访问分别实施和操作外部互联网服务。对匿名网络Tor、I2P分别从使用术语、项目开发、匿名服务、关键技术、威胁类型等多个方面进行比较,揭示两种匿名网络的内在联系与本质区别。展开更多
随着人们隐私保护意识的提高,匿名通信系统获得了越来越多的关注.I2P(invisible Internet project)是当前应用最广泛的匿名通信系统之一,与Tor(另一种非常流行的匿名通信系统)网络类似,I2P采用大蒜路由的方式隐藏通信双方的通信关系,即...随着人们隐私保护意识的提高,匿名通信系统获得了越来越多的关注.I2P(invisible Internet project)是当前应用最广泛的匿名通信系统之一,与Tor(另一种非常流行的匿名通信系统)网络类似,I2P采用大蒜路由的方式隐藏通信双方的通信关系,即通过使用包含多个节点的隧道,使得隧道中的任意单一节点都不能同时获知通信双方的身份信息.然而,如果能够共谋同一隧道的两端节点或是能同时观察到I2P通信链路进、出I2P网络的流量,攻击者依然可以通过流量分析的方法对通信的双方进行关联,进而破坏I2P网络的匿名性.通过分别从I2P网络内部攻击者和传输路径上外部网络攻击者的角度,对当前I2P路径选择过程中可能面临的共谋攻击威胁进行分析,结果显示,I2P网络当前的路径选择算法并不能有效地防范内部攻击者和外部网络攻击者,I2P网络的匿名性仍然面临着巨大的共谋攻击威胁.展开更多
多层加密匿名网络旨在通过将用户与其最终目的地分离来为用户提供匿名和隐藏服务,Tor (The Onion Router)和I2P (Invisible Internet project)都是多层加密匿名网络,目前已受到学术界、工业界的高度重视,也受到用户的欢迎。但Tor和I2P...多层加密匿名网络旨在通过将用户与其最终目的地分离来为用户提供匿名和隐藏服务,Tor (The Onion Router)和I2P (Invisible Internet project)都是多层加密匿名网络,目前已受到学术界、工业界的高度重视,也受到用户的欢迎。但Tor和I2P之间由于其设计理念上存在差别,因此其网络关键技术存在明显差异,这些差异主要体现在网络体系结构、网络管理、接口技术、交换技术、路由技术、密码规格、节点选择与发现等方面。通过对匿名网络Tor、I2P的关键技术进行比较分析和研究,可以全面理解Tor和I2P网络的工作原理,了解两种网络各自的技术特点和匿名性与安全性上存在的问题,为Tor和I2P的去匿名化和网络测量等研究奠定基础。展开更多
The rise of automation with Machine-Type Communication(MTC)holds great potential in developing Industrial Internet of Things(IIoT)-based applications such as smart cities,Intelligent Transportation Systems(ITS),supply...The rise of automation with Machine-Type Communication(MTC)holds great potential in developing Industrial Internet of Things(IIoT)-based applications such as smart cities,Intelligent Transportation Systems(ITS),supply chains,and smart industries without any human intervention.However,MTC has to cope with significant security challenges due to heterogeneous data,public network connectivity,and inadequate security mechanism.To overcome the aforementioned issues,we have proposed a blockchain and garlic-routing-based secure data exchange framework,i.e.,GRADE,which alleviates the security constraints and maintains the stable connection in MTC.First,the Long-Short-Term Memory(LSTM)-based Nadam optimizer efficiently predicts the class label,i.e.,malicious and non-malicious,and forwards the non-malicious data requests of MTC to the Garlic Routing(GR)network.The GR network assigns a unique ElGamal encrypted session tag to each machine partaking in MTC.Then,an Advanced Encryption Standard(AES)is applied to encrypt the MTC data requests.Further,the InterPlanetary File System(IPFS)-based blockchain is employed to store the machine's session tags,which increases the scalability of the proposed GRADE framework.Additionally,the proposed framework has utilized the indispensable benefits of the 6G network to enhance the network performance of MTC.Lastly,the proposed GRADE framework is evaluated against different performance metrics such as scalability,packet loss,accuracy,and compromised rate of the MTC data request.The results show that the GRADE framework outperforms the baseline methods in terms of accuracy,i.e.,98.9%,compromised rate,i.e.,18.5%,scalability,i.e.,47.2%,and packet loss ratio,i.e.,24.3%.展开更多
The Internet as the whole is a network of multiple computer networks and their massive infrastructure. The web is made up of accessible websites through search engines such as Google, Firefox, etc. and it is known as ...The Internet as the whole is a network of multiple computer networks and their massive infrastructure. The web is made up of accessible websites through search engines such as Google, Firefox, etc. and it is known as the Surface Web. The Internet is segmented further in the Deep Web—the content that it is not indexed and cannot access by traditional search engines. Dark Web considers a segment of the Deep Web. It accesses through TOR. Actors within Dark Web websites are anonymous and hidden. Anonymity, privacy and the possibility of non-detection are three factors that are provided by special browser such as TOR and I2P. In this paper, we are going to discuss and provide results about the influence of the Dark Web in different spheres of society. It is given the number of daily anonymous users of the Dark Web (using TOR) in Kosovo as well as in the whole world for a period of time. The influence of hidden services websites is shown and results are gathered from Ahimia and Onion City Dark Web’s search engines. The anonymity is not completely verified on the Dark Web. TOR dedicates to it and has intended to provide anonymous activities. Here are given results about reporting the number of users and in which place(s) they are. The calculation is based on IP addresses according to country codes from where comes the access to them and report numbers in aggregate form. In this way, indirect are represented the Dark Web users. The number of users in anonymous networks on the Dark Web is another key element that is resulted. In such networks, users are calculated through the client requests of directories (by TOR metrics) and the relay list is updated. Indirectly, the number of users is calculated for the anonymous networks.展开更多
制造最好的、富有新意的吉他一直是“Brian Moore Guitars”公司的宗旨。 “Brian Moore Guitars”公司成立于1992年。在1994年,公司推出了木质贴面、琴颈通体的吉他——M C/1。它是由前Steinberger的雇员---BrianMoore和公司总裁Patric...制造最好的、富有新意的吉他一直是“Brian Moore Guitars”公司的宗旨。 “Brian Moore Guitars”公司成立于1992年。在1994年,公司推出了木质贴面、琴颈通体的吉他——M C/1。它是由前Steinberger的雇员---BrianMoore和公司总裁Patrick Cummings(曾在Gibson公司任职)共同设计完成的。现今,公司已经发展壮大,Brian Moore开始做全木质的琴,而且在海外设厂。展开更多
随着网络技术的发展,人们越来越重视个人隐私。I2P(Invisible Internet Project)是一种低时延的匿名通信系统,旨在保护用户通信免受法网监视和第三方(如ISP)的监视。它内部集成了诸多应用可供用户使用,比如email通信,IRC匿名聊天,网页...随着网络技术的发展,人们越来越重视个人隐私。I2P(Invisible Internet Project)是一种低时延的匿名通信系统,旨在保护用户通信免受法网监视和第三方(如ISP)的监视。它内部集成了诸多应用可供用户使用,比如email通信,IRC匿名聊天,网页浏览以及文件共享P2P下载等等。本文设计和完成了一个I2P节点数据分析系统IRAS(I2P RouterInfo Analyze System),通过在中国,美国,英国,德国,澳大利亚部署I2P服务器来获取节点信息,来对不同特征的节点数据样本进行实验分析,统计样本特性。展开更多
I2P(invisible Internet project)是当前应用最广泛的匿名网络之一,采用大蒜路由的方式隐藏通信双方的通信关系,使用强加密协议和构建网络层的方法隐藏用户身份,并提供隐藏服务,进而达到全匿名的目的.但其也存在许多安全问题.通过对I2P...I2P(invisible Internet project)是当前应用最广泛的匿名网络之一,采用大蒜路由的方式隐藏通信双方的通信关系,使用强加密协议和构建网络层的方法隐藏用户身份,并提供隐藏服务,进而达到全匿名的目的.但其也存在许多安全问题.通过对I2P网络的系统结构、工作原理、大蒜路由技术等方面的分析,指出了I2P存在的问题,并给出解决思路和技术构想.展开更多
A web browser is the most basic tool for accessing the internet from any of the machines/equipment.Recently,data breaches have been reported frequently from users who are concerned about their personal information,as ...A web browser is the most basic tool for accessing the internet from any of the machines/equipment.Recently,data breaches have been reported frequently from users who are concerned about their personal information,as well as threats from criminal actors.Giving loss of data and information to an innocent user comes under the jurisdiction of cyber-attack.These kinds of cyber-attacks are far more dangerous when it comes to the many types of devices employed in an internet of things(IoT)environment.Continuous surveillance of IoT devices and forensic tools are required to overcome the issues pertaining to secure data and assets.Peer to peer(P2P)applications have been utilized for criminal operations on the web.Therefore,it is a challenge for a forensic investigator to perform forensic analysis of the evolving hardware and software platforms for IoT.For identity concealment and privacy protection,the Onion Router(Tor)and Chrome with the Invisible Internet Project(I2P)as the foundation browser are often used.Confirmation is required to determine whether Tor is truly anonymous and private as they claim.Some people,on the other hand,utilize the Tor browser for evil reasons.Tools and techniques are available for the collection of artifacts,identifying problem areas,further processing and analysis of data on the computer and IoT.Present research tried to explore a few tools for the tracing of I2P activities over computer on windows 10 that reflects IoT devices.According to the results of this research,it leaves an excessive amount of important digital evidence on the operating system that can be exploited to attack the information of users.This research is based on windows operating system and does not support other operating systems.展开更多
文摘Tor(theonionrouter)是部署最多的匿名通信系统,提供在线匿名和隐私保护,而隐形互联网I2P(invisible Internet project)允许应用程序通过使用大蒜路由,以匿名和安全方式相互发送消息。匿名网络Tor和I2P目前已受到学术界、工业界的高度重视,也受到用户的欢迎。网络Tor和I2P之间的设计理念区别关键在于:I2P试图将现有的互联网服务转移到I2P网络,并在框架内提供服务实现,而Tor则允许匿名访问分别实施和操作外部互联网服务。对匿名网络Tor、I2P分别从使用术语、项目开发、匿名服务、关键技术、威胁类型等多个方面进行比较,揭示两种匿名网络的内在联系与本质区别。
文摘随着人们隐私保护意识的提高,匿名通信系统获得了越来越多的关注.I2P(invisible Internet project)是当前应用最广泛的匿名通信系统之一,与Tor(另一种非常流行的匿名通信系统)网络类似,I2P采用大蒜路由的方式隐藏通信双方的通信关系,即通过使用包含多个节点的隧道,使得隧道中的任意单一节点都不能同时获知通信双方的身份信息.然而,如果能够共谋同一隧道的两端节点或是能同时观察到I2P通信链路进、出I2P网络的流量,攻击者依然可以通过流量分析的方法对通信的双方进行关联,进而破坏I2P网络的匿名性.通过分别从I2P网络内部攻击者和传输路径上外部网络攻击者的角度,对当前I2P路径选择过程中可能面临的共谋攻击威胁进行分析,结果显示,I2P网络当前的路径选择算法并不能有效地防范内部攻击者和外部网络攻击者,I2P网络的匿名性仍然面临着巨大的共谋攻击威胁.
文摘多层加密匿名网络旨在通过将用户与其最终目的地分离来为用户提供匿名和隐藏服务,Tor (The Onion Router)和I2P (Invisible Internet project)都是多层加密匿名网络,目前已受到学术界、工业界的高度重视,也受到用户的欢迎。但Tor和I2P之间由于其设计理念上存在差别,因此其网络关键技术存在明显差异,这些差异主要体现在网络体系结构、网络管理、接口技术、交换技术、路由技术、密码规格、节点选择与发现等方面。通过对匿名网络Tor、I2P的关键技术进行比较分析和研究,可以全面理解Tor和I2P网络的工作原理,了解两种网络各自的技术特点和匿名性与安全性上存在的问题,为Tor和I2P的去匿名化和网络测量等研究奠定基础。
文摘The rise of automation with Machine-Type Communication(MTC)holds great potential in developing Industrial Internet of Things(IIoT)-based applications such as smart cities,Intelligent Transportation Systems(ITS),supply chains,and smart industries without any human intervention.However,MTC has to cope with significant security challenges due to heterogeneous data,public network connectivity,and inadequate security mechanism.To overcome the aforementioned issues,we have proposed a blockchain and garlic-routing-based secure data exchange framework,i.e.,GRADE,which alleviates the security constraints and maintains the stable connection in MTC.First,the Long-Short-Term Memory(LSTM)-based Nadam optimizer efficiently predicts the class label,i.e.,malicious and non-malicious,and forwards the non-malicious data requests of MTC to the Garlic Routing(GR)network.The GR network assigns a unique ElGamal encrypted session tag to each machine partaking in MTC.Then,an Advanced Encryption Standard(AES)is applied to encrypt the MTC data requests.Further,the InterPlanetary File System(IPFS)-based blockchain is employed to store the machine's session tags,which increases the scalability of the proposed GRADE framework.Additionally,the proposed framework has utilized the indispensable benefits of the 6G network to enhance the network performance of MTC.Lastly,the proposed GRADE framework is evaluated against different performance metrics such as scalability,packet loss,accuracy,and compromised rate of the MTC data request.The results show that the GRADE framework outperforms the baseline methods in terms of accuracy,i.e.,98.9%,compromised rate,i.e.,18.5%,scalability,i.e.,47.2%,and packet loss ratio,i.e.,24.3%.
文摘The Internet as the whole is a network of multiple computer networks and their massive infrastructure. The web is made up of accessible websites through search engines such as Google, Firefox, etc. and it is known as the Surface Web. The Internet is segmented further in the Deep Web—the content that it is not indexed and cannot access by traditional search engines. Dark Web considers a segment of the Deep Web. It accesses through TOR. Actors within Dark Web websites are anonymous and hidden. Anonymity, privacy and the possibility of non-detection are three factors that are provided by special browser such as TOR and I2P. In this paper, we are going to discuss and provide results about the influence of the Dark Web in different spheres of society. It is given the number of daily anonymous users of the Dark Web (using TOR) in Kosovo as well as in the whole world for a period of time. The influence of hidden services websites is shown and results are gathered from Ahimia and Onion City Dark Web’s search engines. The anonymity is not completely verified on the Dark Web. TOR dedicates to it and has intended to provide anonymous activities. Here are given results about reporting the number of users and in which place(s) they are. The calculation is based on IP addresses according to country codes from where comes the access to them and report numbers in aggregate form. In this way, indirect are represented the Dark Web users. The number of users in anonymous networks on the Dark Web is another key element that is resulted. In such networks, users are calculated through the client requests of directories (by TOR metrics) and the relay list is updated. Indirectly, the number of users is calculated for the anonymous networks.
文摘制造最好的、富有新意的吉他一直是“Brian Moore Guitars”公司的宗旨。 “Brian Moore Guitars”公司成立于1992年。在1994年,公司推出了木质贴面、琴颈通体的吉他——M C/1。它是由前Steinberger的雇员---BrianMoore和公司总裁Patrick Cummings(曾在Gibson公司任职)共同设计完成的。现今,公司已经发展壮大,Brian Moore开始做全木质的琴,而且在海外设厂。
文摘I2P(invisible Internet project)是当前应用最广泛的匿名网络之一,采用大蒜路由的方式隐藏通信双方的通信关系,使用强加密协议和构建网络层的方法隐藏用户身份,并提供隐藏服务,进而达到全匿名的目的.但其也存在许多安全问题.通过对I2P网络的系统结构、工作原理、大蒜路由技术等方面的分析,指出了I2P存在的问题,并给出解决思路和技术构想.
基金supported by Yayasan Universiti Teknologi PETRONAS Grant Scheme015LC0029 and 015LC0277.
文摘A web browser is the most basic tool for accessing the internet from any of the machines/equipment.Recently,data breaches have been reported frequently from users who are concerned about their personal information,as well as threats from criminal actors.Giving loss of data and information to an innocent user comes under the jurisdiction of cyber-attack.These kinds of cyber-attacks are far more dangerous when it comes to the many types of devices employed in an internet of things(IoT)environment.Continuous surveillance of IoT devices and forensic tools are required to overcome the issues pertaining to secure data and assets.Peer to peer(P2P)applications have been utilized for criminal operations on the web.Therefore,it is a challenge for a forensic investigator to perform forensic analysis of the evolving hardware and software platforms for IoT.For identity concealment and privacy protection,the Onion Router(Tor)and Chrome with the Invisible Internet Project(I2P)as the foundation browser are often used.Confirmation is required to determine whether Tor is truly anonymous and private as they claim.Some people,on the other hand,utilize the Tor browser for evil reasons.Tools and techniques are available for the collection of artifacts,identifying problem areas,further processing and analysis of data on the computer and IoT.Present research tried to explore a few tools for the tracing of I2P activities over computer on windows 10 that reflects IoT devices.According to the results of this research,it leaves an excessive amount of important digital evidence on the operating system that can be exploited to attack the information of users.This research is based on windows operating system and does not support other operating systems.