用户名: 密码: 验证码:
匿名通信与暗网研究综述
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Anonymous Communication and Darknet:A Survey
  • 作者:罗军舟 ; 杨明 ; 凌振 ; 吴文甲 ; 顾晓丹
  • 英文作者:Luo Junzhou;Yang Ming;Ling Zhen;Wu Wenjia;Gu Xiaodan;School of Computer Science and Engineering,Southeast University;
  • 关键词:匿名通信 ; 暗网 ; 隐藏服务 ; 攻防技术 ; 暗网治理
  • 英文关键词:anonymous communication;;darknet;;hidden services;;attack and defense technologies;;darknet governance
  • 中文刊名:JFYZ
  • 英文刊名:Journal of Computer Research and Development
  • 机构:东南大学计算机科学与工程学院;
  • 出版日期:2018-12-21 16:57
  • 出版单位:计算机研究与发展
  • 年:2019
  • 期:v.56
  • 基金:国家重点研发计划项目(2017YFB1003000,2018YFB0803400);; 国家自然科学基金项目(61572130,61502100,61532013,61632008);; 江苏省科技成果转化基金项目(BA2016052)~~
  • 语种:中文;
  • 页:JFYZ201901011
  • 页数:28
  • CN:01
  • ISSN:11-1777/TP
  • 分类号:107-134
摘要
匿名通信系统是一种建立在Internet之上综合利用数据转发、内容加密、流量混淆等多种技术隐藏通信实体关系和内容的覆盖网络.由于匿名通信主体难以被追踪定位,匿名通信网络中各类匿名滥用问题层出不穷,而其中隐藏服务机制更是被用于构建充斥着各种非法活动的暗网,给社会和人们带来了巨大的危害和影响.鉴于目前在匿名通信与暗网领域尚缺乏全面、深入的技术剖析与研究综述,重点对两者的基本概念及相互关系进行阐述,并围绕Tor,I2P,Freenet,ZeroNet这4种主流暗网形态,详细介绍了匿名通信的工作原理,以及匿名接入、匿名路由和暗网服务三大关键技术.在此基础上,分析总结了匿名通信攻击与防御技术的研究现状,并介绍了暗网治理方面的相关研究工作.最后,对下一代匿名通信系统的发展趋势进行展望,并初步探讨了暗网治理面临的挑战和思路.
        An anonymous communication system is an overlay network built on top of the Internet that integratedly uses various anonymous technologies such as data forwarding,content encryption and traffic obfuscation to conceal the relationships between the communication entities and hide their communication content from being revealed.Since it is quite difficult to traceback and locate the communication entities,considerable abuse problems have sprung up.Specifically,the hidden services of anonymous network are most often abusively used to establish darknets where diverse illegal activities take place,bringing huge harm to the individuals and society.At present,it lacks comprehensive and deep technical analysis and research survey in the field of anonymous communication system and darknet study.Based on the status quo,this paper first elaborates on the basic concepts of the two terms and their relationships,then continues to demonstrate the work mechanisms and three key technologies of the anonymous communication system in detail including anonymous access,anonymous routing and darknet services with an exemplification of the four mainstream darknets,which are Tor,I2 P,Freenet and ZeroNet.On this basis,the paper summarizes the state-of-the-art anonymous communication attacks and defense technology,and introduces the research work on current darknet governance as well.Finally,the developing trend of the next generation anonymous communication system is prospected,and the challenges of the darknet governance and relevant countermeasures are also discussed.
引文
[1]Tor Metrics Team.Onion services-Tor metrics[EB/OL].[2018-10-01].http:metrics.torproject.org/
    [2]Chaum D L.Untraceable electronic mail,return addresses,and digital pseudonyms[J].Communications of the ACM,1981,24(2):84-88
    [3]Danezis G.Mix-networks with restricted routes[C]Proc of the 3rd Int Workshop on Privacy Enhancing Technologies.Berlin:Springer,2003:1-17
    [4]Dingledine R,Freedman M J,Hopwood D,et al.Areputation system to increase MIX-Net reliability[C]Proc of the 4th Int Workshop on Information Hiding.Berlin:Springer,2001:126-141
    [5]Dingledine R,Syverson P.Reliable MIX cascade networks through reputation[C]Proc of the 6th Int Financial Cryptography Conf.Berlin:Springer,2002:253-268
    [6]Gulcu C,Tsudik G.Mixing E-mail with Babel[C]Proc of Int Society Symp on Network and Distributed Systems Security.Rosten:The Internet Society,1996:2-16
    [7]Moeller U,Cottrell L,Palfrader P,et al.Mixmaster protocol-version 2[EB/OL].[2018-09-01].https:tools.ietf.org/pdf/draft-sassaman-mixmaster-03.pdf
    [8]Danezis G,Dingledine R,Mathewson N.Mixminion:Design of a typeⅢanonymous remailer protocol[C]Proc of the24th IEEE Symp on Security and Privacy.Piscataway,NJ:IEEE,2003:2-15
    [9]Goldberg I,Shostack A.Freedom network 1.0architecture and protocols[EB/OL].[2018-09-01].https:adam.shostack.org/zeroknowledgewhitepapers/arch-tech.pdf
    [10]McLachlan J,Tran A,Hopper N,et al.Scalable onion routing with Torsk[C]Proc of the 16th ACM Conf on Computer and Communications Security.New York:ACM,2009:590-599
    [11]Reiter M K,Rubin A D,Crowds:Anonymity for Web transactions[J].ACM Transactions on Information and System Security,1998,1(1):66-92
    [12]Chen C,Asoni D E,Perrig A,et al.TARANET:Trafficanalysis resistant anonymity at the network layer[EB/OL].[2018-09-01].https:arxiv.org/pdf/1802.08415.pdf
    [13]Kwon A,Lazar D,Devadas S,et al.Riffle:An efficient communication system with strong anonymity[J].Proceedings on Privacy Enhancing Technologies,2016,2016(2):115-134
    [14]Piotrowska A M,Hayes J,Elahi T,et al.The loopix anonymity system[C]Proc of the 26th USENIX Security Symp.Berkeley,CA:USENIX Association,2017:16-18
    [15]Dingledine R,Mathewson N,Syverson P.Tor:The secondgeneration onion router[C]Proc of the 13th USENIXSecurity Symp.Berkeley,CA:USENIX Association,2004:1-18
    [16]The I2PDevelopment Team.The Invisible Internet Project[EB/OL].[2018-09-01].https:geti2p.net/zh/
    [17]The I2PDevelopment Team.The Invisible Internet Project:Introduction to I2P[EB/OL].[2018-09-01].https:geti2p.net/zh/blog/page/
    [18]The I2PDevelopment Team.The Invisible Internet Project:The network database[EB/OL].[2018-09-01].http:www.i2pproject.net/zh/docs/how/network-database
    [19]Maymounkov P,Mazieres D.Kademlia:A peer-to-peer information system based on the xor metric[C]Proc of the1st Int Workshop on Peer-to-Peer Systems.Berlin:Springer,2002:53-65
    [20]Douceur J R.The sybil attack[C]Proc of the 1st Int Workshop on Peer-to-Peer Systems.Berlin:Springer,2002:251-260
    [21]Clarke I,Sandberg O,Wiley B,et al.Freenet:A distributed anonymous information storage and retrieval system[C]Proc of Int Workshop on Designing Privacy Enhancing Technologies:Design Issues in Anonymity and Unobservability.Berlin:Springer,2001:46-66
    [22]Clarke I,Miller S G,Hong T W,et al.Protecting free expression online with Freenet[J].IEEE Internet Computing,2002,6(1):40-49
    [23]Clarke I,Sandberg O,Toseland M,et al.Private communication through a network of trusted connections:The dark Freenet[EB/OL].[2018-09-01].https:freenetproject.org/assets/papers/freenet-0.7.5-paper.pdf
    [24]Smits R,Jain D,Pidcock S,et al.BridgeSPA:Improving Tor bridges with single packet authorization[C]Proc of the10th ACM Workshop on Privacy in the Electronic Society.New York:ACM,2011:93-102
    [25]He G,Yang M,Luo J,et al.A novel application classification attack against Tor[J].Concurrency&Computation Practice&Experience,2016,27(18):5640-5661
    [26]Kadianakis G.pluggable-transports/obfsproxy obfs2[OL].[2018-10-25].https:gitweb.torproject.org/pluggabletransports/obfsproxy.git/tree/doc/obfs2/obfs2-protocol-spec.txt
    [27]Kadianakis G.pluggable-transports/obfsproxy obfs3[OL].[2018-10-25]https:gitweb.torproject.org/pluggabletransports/obfsproxy.git/tree/doc/obfs3/obfs3-protocol-spec.txt
    [28]Angel Y.obfs4/blob/master/doc/obfs4-spec.txt obfs4[OL].[2018-10-25].https:github.com/Yawning/obfs4/blob/master/doc/obfs4-spec.txt
    [29]Winter P,Pulls T,Fuss J.ScrambleSuit:A polymorphic network protocol to circumvent censorship[C]Proc of the12th ACM Workshop on Privacy in the Electronic Society.New York:ACM,2013:213-224
    [30]Fifield D,Lan C,Hynes R,et al.Blocking-resistant communication through domain fronting[J].Proceedings on Privacy Enhancing Technologies,2015,2015(2):46-64
    [31]Dyer K P,Coull S E,Ristenpart T,et al.Protocol misidentification made easy with format-transforming encryption[C]Proc of ACM SIGSAC Conf on Computer and Communications Security.New York:ACM,2013:61-72
    [32]Moshchuk A,Gribble S D,Levy H M.Flashproxy:Transparently enabling rich Web content via remote execution[C]Proc of the 6th Int Conf on Mobile Systems,Applications,and Services.New York:ACM,2008:81-93
    [33]Snader R,Borisov N.A tune-up for Tor:Improving security and performance in the Tor network[C]Proc of the 15th Annual Network and Distributed System Security Symp.Rosten:The Internet Society,2008:1-10
    [34]Panchenko A,Lanze F,Engel T.Improving performance and anonymity in the Tor network[C]Proc of the 31st Int Performance Computing and Communications Conf.Piscataway,NJ:IEEE,2012:1-10
    [35]Rochet F,Pereira O.Waterfiling:Balancing the Tor network with maximum diversity[J].Proceedings on Privacy Enhancing Technologies,2017,2017(2):4-22
    [36]Wang T,Bauer K,Forero C,et al.Congestion-aware path selection for Tor[C]Proc of the 16th Int Conf on Financial Cryptography and Data Security.Berlin:Springer,2012:98-113
    [37]Liu Z,Liu Y,Winter P,et al.TorPolice:Towards enforcing service-defined access policies for anonymous communication in the Tor network[C]Proc of the 25th Int Conf on Network Protocols.Piscataway,NJ:IEEE,2017:1-10
    [38]Tang C,Goldberg I.An improved algorithm for Tor circuit scheduling[C]Proc of the 17th ACM Conf on Computer and Communications Security.New York:ACM,2010:329-339
    [39]Alsabah M,Bauer K,Goldberg I.Enhancing Tor's performance using real-time traffic classification[C]Proc of the 19th ACM Conf on Computer and Communications Security.New York:ACM,2012:73-84
    [40]Alsabah M,Bauer K,Elahi T,et al.The path less travelled:Overcoming Tor's bottlenecks with traffic splitting[C]Proc of the 13th Int Symp on Privacy Enhancing Technologies Symp.Berlin:Springer,2013:143-163
    [41]Wacek C,Tan H,Bauer K S,et al.An empirical evaluation of relay selection in Tor[C]Proc of the 20th Network and Distributed System Security Symp.Rosten:The Internet Society,2013:24-41
    [42]Backes M,Kate A,Meiser S,et al.(Nothing else)MATor(s):Monitoring the anonymity of Tor's path selection[C]Proc of ACM SIGSAC Conf on Computer and Communications Security.New York:ACM,2014:513-524
    [43]Backes M,Meiser S,Slowik M.Your choice MATor(s):Large-scale quantitative anonymity assessment of Tor path selection algorithms against structural attacks[J].Proceedings on Privacy Enhancing Technologies,2016,2016(2):40-60
    [44]Matic S,Troncoso C,Caballero J.Dissecting Tor bridges:Asecurity evaluation of their private and public infrastructures[C]Proc of the 24th Network and Distributed Systems Security Symp.Rosten:The Internet Society,2017:1-15
    [45]Alsabah M,Goldberg I.Performance and security improvements for Tor:A survey[J].ACM Computing Surveys,2016,49(2):No.32
    [46]Schimmer L,et al.Peer profiling and selection in the I2Panonymous network[EB/OL].[2009-01-10].https:gnunet.org/sites/default/files/I2P-PET-CON-2009.1.pdf
    [47]Liu Peipeng,Wang Lihong,Shi Jinqiao,et al.Towards analysis of security in I2P's path selection[J].Journal of Computer Research and Development,2014,51(7):1555-1564(in Chinese)(刘培朋,王丽宏,时金桥,等.匿名网络I2P路径选择的安全性分析[J].计算机研究与发展,2014,51(7):1555-1564)
    [48]Shirazi F,Simeonovski M,Asghar M R,et al.A survey on routing in anonymous communication protocols[J].ACMComputing Surveys,2018,51(3):1-39
    [49]Baumeister T,Dong Y F,Duan Z H,et al.Routing Table Insertion(RTI)attack on Freenet:Technical report[EB/OL].[2018-09-01].http:www.ee.hawaii.edu/~dong/traceback/RTI.pdf
    [50]verlier L,Syverson P.Valet services:Improving hidden servers with a personal touch[C]Proc of the 6th Int Conf on Privacy Enhancing Technologies.Berlin:Springer,2006:223-244
    [51]Loesing K,Sandmann W,Wilms C,et al.Performance measurements and statistics of Tor hidden services[C]Proc of Int Symp on Applications and the Internet.Piscataway,NJ:IEEE,2008:1-7
    [52]Lenhard J,Loesing K,Wirtz G.Performance measurements of Tor hidden services in low-bandwidth access networks[C]Proc of the 7th Int Conf on Applied Cryptography and Network Security.Berlin:Springer,2009:324-341
    [53]lan C,Matthew T,Oskar S,et al.Freenet Project[OL].[2018-09-01].https:freenetproject.org/pages/documentation.html
    [54]Yang M,Luo J,Ling Z,et al.De-anonymizing and countermeasures in anonymous communication networks[J].IEEE Communications Magazine,2015,53(4):60-66
    [55]Edman M,Syverson P.As-awareness in Tor path selection[C]Proc of the 16th ACM Conf on Computer and Communications Security.New York:ACM,2009:380-389
    [56]Akhoondi M,Yu C,Madhyastha H V.LASTor:A lowlatency As-Aware Tor client[C]Proc of the 33rd IEEESymp on Security and Privacy.Piscataway,NJ:IEEE,2012:476-490
    [57]Murdoch S J,Zieliński P.Sampled traffic analysis by Internet-exchange-level adversaries[C]Proc of the 7th Int Workshop on Privacy Enhancing Technologies.Berlin:Springer,2007:167-183
    [58]Johnson A,Wacek C,Jansen R,et al.Users get routed:Traffic correlation on Tor by realistic adversaries[C]Proc of the 20th ACM SIGSAC Conf on Computer and Communications Security.New York:ACM,2013:337-348
    [59]Nasr M,Bahramali A,Houmansadr A.DeepCorr:Strong flow correlation attacks on Tor using deep learning[C]Proc of the 25th ACM SIGSAC Conf on Computer and Communications Security.New York:ACM,2018:1962-1976
    [60]Bauer K,Mccoy D,Grunwald D,et al.Low-resource routing attacks against Tor[C]Proc of ACM Workshop on Privacy in the Electronic Society.New York:ACM,2007:11-20
    [61]Pappas V,Athanasopoulos E,Ioannidis S,et al.Compromising anonymity using packet spinning[C]Proc of the 11th Int Conf on Information Security.Berlin:Springer,2008:161-174
    [62]Ling Z,Luo J Z,Yu W,et al.A new cell-counting-based attack against Tor[J].IEEE/ACM Transactions on Networking,2012,20(4):1245-1261
    [63]Yu W,Fu X,Graham S,et al.DSSS-Based flow marking technique for invisible traceback[C]Proc of the 28th IEEESymp on Security and Privacy.Piscataway,NJ:IEEE,2007:18-32
    [64]Wang X,Chen S,Jajodia S.Network flow watermarking attack on low-latency anonymous communication systems[C]Proc of the 28th IEEE Symp on Security and Privacy.Piscataway,NJ:IEEE,2007:116-130
    [65]Wang X,Chen S,Jajodia S.Tracking anonymous peer-topeer VoIP calls on the Internet[C]Proc of the 12th ACMConf on Computer and Communications Security.New York:ACM,2005:81-91
    [66]Houmansadr A,Kiyavash N,Borisov N.RAINBOW:Arobust and invisible non-blind watermark for network flows[C]Proc of the 16th Network and Distributed Systems Security Symp.Rosten:The Internet Society,2009:222-228
    [67]Houmansadr A,Borisov N.SWIRL:A scalable watermark to detect correlated network flows[C]Proc of the 18th Network and Distributed Systems Security Symp.Rosten:The Internet Society,2011:17-24
    [68]Rezaei F,Houmansadr A.TagIt:Tagging network flows using blind fingerprints[J].Proceedings on Privacy Enhancing Technologies,2017,2017(4):290-307
    [69]Ling Z,Fu X,Jia W,et al.Novel packet size-based covert channel attacks against anonymizer[J].IEEE Transactions on Computers,2013,62(12):2411-2426
    [70]Ling Z,Luo J,Yu W,et al.A new cell counter based attack against Tor[C]Proc of the 16th ACM Conf on Computer and Communications Security.New York:ACM,2009:578-589
    [71]Ling Z,Luo J,Yu W,et al.Protocol-level attacks against Tor[J].Computer Networks the International Journal of Computer&Telecommunications Networking,2013,57(4):869-886
    [72]Ramsbrock D,Wang X,Jiang X.A first step towards live botmaster traceback[C]Proc of the 11th Int Workshop on Recent Advances in Intrusion Detection.Berlin:Springer,2008:59-77
    [73]Wang X,Luo J,Yang M,et al.A potential HTTP-based application-level attack against Tor[J].Future Generation Computer Systems,2011,27(1):67-77
    [74]Chakravarty S,Barbera M V,Portokalidis G,et al.On the effectiveness of traffic analysis against anonymity networks using flow records[C]Proc of the 15th Passive and Active Measurement Conf.Los Angeles:PAM,2014:247-257
    [75]Dyer K P,Coull S E,Ristenpart T,et al.Peek-a-Boo,I still see you:Why efficient traffic analysis countermeasures fail[C]Proc of the 33rd IEEE Symp on Security and Privacy.Piscataway,NJ:IEEE,2012:332-346
    [76]Hintz A.Fingerprinting websites using traffic analysis[C]Proc of the 2nd Int Workshop on Privacy Enhancing Technologies.Berlin:Springer,2002:171-178
    [77]Liberatore M,Levine B N.Inferring the source of encrypted HTTP connections[C]Proc of the 13th ACM Conf on Computer and Communications Security.New York:ACM,2006:255-263
    [78]Lu L,Chang E C,Chan M C.Website fingerprinting and identification using ordered feature sequences[C]Proc of the 15th European Conf on Research in Computer Security.Berlin:Springer,2010:199-214
    [79]Panchenko A,Niessen L,Zinnen A,et al.Website fingerprinting in onion routing based anonymization networks[C]Proc of the 10th ACM Workshop on Privacy in the Electronic Society.New York:ACM,2011:103-114
    [80]Cai X,Zhang X C,Joshi B,et al.Touching from a distance:Website fingerprinting attacks and defenses[C]Proc of the19th ACM Conf on Computer and Communications Security.New York:ACM,2012:605-616
    [81]Wang T,Cai X,Nithyanand R,et al.Effective attacks and provable defenses for website fingerprinting[C]Proc of the23rd USENIX Security Symp.Berkeley,CA:USENIXAssociation,2014:143-157
    [82]Hayes J,Danezis G.k-fingerprinting:A robust scalable website fingerprinting technique[C]Proc of the 25th USENIX Security Symp.Berkeley,CA:USENIXAssociation,2016:1187-1203
    [83]Panchenko A,Lanze F,Zinnen A,et al.Website fingerprinting at Internet scale[C]Proc of the 23rd Network and Distributed System Security Symp.Rosten:The Internet Society,2016:1-15
    [84]Nasr M,Houmansadr A,Mazumdar A.Compressive traffic analysis:A new paradigm for scalable traffic analysis[C]Proc of the 24th ACM SIGSAC Conf on Computer and Communications Security.New York:ACM,2017:2053-2069
    [85]Rimmer V,Preuveneers D,Juarez M,et al.Automated website fingerprinting through deep learning[C]Proc of the 25th Network and Distributed Systems Security Symp.Rosten:The Internet Society,2018:1-16
    [86]Zhuo Z,Zhang Y,Zhang Z L,et al.Website fingerprinting attack on anonymity networks based on profile hidden Markov model[J].IEEE Transactions on Information Forensics&Security,2018,13(5):1081-1095
    [87]Levine B N,Liberatore M,Lynn B,et al.Statistical detection of downloaders in Freenet[C]Proc of the 3rd IEEE Int Workshop on Privacy Engineering.Piscataway,NJ:IEEE,2017:25-32
    [88]Winter P,Ensafi R,Loesing K,et al.Identifying and characterizing Sybils in the Tor network[C]Proc of the25th USENIX Security Symp.Berkeley,CA:USENIXAssociation,2016:1169-1185
    [89]Winter P,K9wer R,Mulazzani M,et al.Spoiled onions:Exposing malicious Tor exit relays[C]Proc of the 14th Int Symp on Privacy Enhancing Technologies Symp.Berlin:Springer,2014:304-331
    [90]He G,Yang M,Gu X,et al.A novel active website fingerprinting attack against Tor anonymous system[C]Proc of the 18th IEEE Int Conf on Computer Supported Cooperative Work in Design.Piscataway,NJ:IEEE,2014:112-117
    [91]Yang M,Gu X,Ling Z,et al.An active de-anonymizing attack against Tor Web traffic[J].Tsinghua Science and Technology,2017,22(6):702-713
    [92]Baumeister T,Dong Y,Duan Z,et al.A routing table insertion(RTI)attack on Freenet[C]Proc of Int Conf on Cyber Security.Piscataway,NJ:IEEE,2012:8-15
    [93]Tian G,Duan Z,Baumeister T,et al.A traceback attack on Freenet[C]Proc of the 32nd IEEE Int Conf on Computer Communications.Piscataway,NJ:IEEE,2013:1797-1805
    [94]Jansen R,Tschorsch F,Johnson A,et al.The sniper attack:Anonymously deanonymizing and disabling the Tor network[R].Arlington,VA:Office of Naval Research,2014
    [95]Egger C,Schlumberger J,Kruegel C,et al.Practical attacks against the I2Pnetwork[C]Proc of the 16th Int Workshop on Recent Advances in Intrusion Detection.Berlin:Springer,2013:432-451
    [96]Cai X,Nithyanand R,Wang T,et al.A systematic approach to developing and evaluating website fingerprinting defenses[C]Proc of the 21st ACM SIGSAC Conf on Computer and Communications Security.New York:ACM,2014:227-238
    [97]Wright C V,Coull S E,Monrose F.Traffic Morphing:An efficient defense against statistical traffic analysis[C]Proc of the 16th Network and Distributed System Security Symp.Rosten:The Internet Society,2009:237-250
    [98]Chan-Tin E,Kim T,Kim J.Website fingerprinting attack mitigation using traffic morphing[C]Proc of the 38th IEEE Int Conf on Distributed Computing Systems.Piscataway,NJ:IEEE Computer Society,2018:1575-1578
    [99]Perry M.Experimental defense for website traffic fingerprinting[OL].[2018-12-19].https:blog.torproject.org/blog/experimentaldefense-website-traffic-fingerprinting
    [100]Perry M.A critique of website traffic fingerprinting attacks[OL].[2018-12-19].https:blog.torproject.org/critiquewebsite-traffic-fingerprinting-attacks
    [101]Nithyanand R,Starov O,Zair A,et al.Measuring and mitigating AS-level adversaries against Tor[J].Computer Science,2015:1-13
    [102]Juen J,Das A,Johnson A,et al.Defending Tor from network adversaries:A case study of network path prediction[J].Proceedings on Privacy Enhancing Technologies,2015,2015(2):171-187
    [103]Luo X,Zhou P,Chan E W,et al.HTTPOS:Sealing information leaks with browser-side obfuscation of encrypted flows[C]Proc of the 18th Network and Distributed System Security Symp.Rosten:The Internet Society,2011:1-20
    [104]Wang T,Goldberg I.Walkie-Talkie:An efficient defense against passive website fingerprinting attacks[C]Proc of the 26th USENIX Security Symp.Berkeley,CA:USENIXAssociation,2017:1375-1390
    [105]Ling Z,Luo J Z,Yu W,et al.Tor bridge discovery:Extensive analysis and large-scale empirical evaluation[J].IEEE Transactions on Parallel and Distributed Systems,2015,26(7):1887-1899
    [106]Yang M,Luo J,Zhang L,et al.How to block Tor's hidden bridges:Detecting methods and countermeasures[J].Journal of Supercomputing,2013,66(3):1285-1305
    [107]Ling Z,Luo J,Yu W,et al.Extensive analysis and largescale empirical evaluation of Tor bridge discovery[C]Proc of the 31st IEEE Int Conf on Computer Communications.Piscataway,NJ:IEEE,2012:2381-2389
    [108]Ling Z,Luo J,Wu K,et al.Protocol-level hidden server discovery[C]Proc of IEEE Int Conf on Computer Communications.Piscataway,NJ:IEEE,2013:1043-1051
    [109]He Gaofeng,Yang Ming,Luo Junzhou,et al.Online identification of Tor anonymous communication traffic[J].Journal of Software,2013,24(3):540-556(in Chinese)(何高峰,杨明,罗军舟,等.Tor匿名通信流量在线识别方法[J].软件学报,2013,24(3):540-556)
    [110]Ling Z,Luo J,Zhang Y,et al.A novel network delay based side-channel attack:Modeling and defense[C]Proc of the 33rd IEEE Int Conf on Computer Communications.Piscataway,NJ:IEEE,2013:2390-2398
    [111]Ling Z,Luo J Z,Wu K,et al.TorWard:Discovery,blocking,and traceback of malicious traffic over Tor[J].IEEE Transactions on Information Forensics and Security,2015,10(12):2515-2530
    [112]Wang X,Yang M,Luo J.A novel sequential watermark detection model for efficient traceback of secret network attack flows[J].Journal of Network and Computer Applications,2013,36(6):1660-1670
    [113]Wang X,Luo J,Yang M.An interval centroid based spread spectrum watermark for tracing multiple network flows[C]Proc of IEEE Int Conf on Systems,Man and Cybernetics.Piscataway,NJ:IEEE,2009:4000-4006
    [114]Zhang Lu,Luo Junzhou,Yang Ming,et al.Interval centroid based flow watermarking technique for anonymous communication traceback[J].Journal of Software,2011,22(10):2358-2371(in Chinese)(张璐,罗军舟,杨明,等.基于时隙质心流水印的匿名通信追踪技术[J].软件学报,2011,22(10):2358-2371)
    [115]Zhang Lu,Luo Junzhou,Yang Ming,et al.Synchronization in inter-packet delay based flow correlation techniques[J].Journal of Computer Research and Development,2011,48(9):1643-1651(in Chinese)(张璐,罗军舟,杨明,等.包间隔流关联技术中的同步问题研究[J].计算机研究与发展,2011,48(9):1643-1651)
    [116]Ling Z,Fu X,Jia W,et al.A novel packet size based covert channel attack against anonymizer[C]Proc of the30th IEEE Int Conf on Computer Communications.Piscataway,NJ:IEEE,2011:186-190
    (1)https://zeronet.readthedocs.io/en/latest/
    (1)https://gitweb.torproject.org/torspec.git/tree/rend-spec-v2.txt
    (1)http://www.i2pproject.net/zh/docs/how/tech-intro

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700