Tor network anonymity evaluation based on node anonymity

被引:0
|
作者
Cui, Jun [1 ,2 ,3 ]
Huang, Changqi [1 ,2 ,3 ]
Meng, Huan [4 ]
Wei, Ran [5 ]
机构
[1] Tiangong Univ, Sch Life Sci, 399 Binshui West Rd, Tianjin 300387, Peoples R China
[2] Tianjin Engn Res Ctr Biomed Elect Technol, Tianjin 300387, Peoples R China
[3] Tianjin Key Lab Qual Control & Evaluat Technol Med, Tianjin 300387, Peoples R China
[4] Tiangong Univ, Sch Elect & Informat Engn, Tianjin 300387, Peoples R China
[5] Beijing Coll Social Adm, Minist Civil Affairs, Training Ctr, Dept Rehabil Engn, Beijing 102600, Peoples R China
关键词
Node anonymity; Behavioral baseline; Network anonymity; Self-built Tor network; Dynamic evaluation;
D O I
10.1186/s42400-023-00191-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to address the shortcomings of traditional anonymity network anonymity evaluation methods, which only analyze from the perspective of the overall network and ignore the attributes of individual nodes, we proposes a dynamic anonymity model based on a self-built anonymous system that combines node attributes, network behavior, and program security monitoring. The anonymity of evaluation nodes is assessed based on stable intervals and behavior baselines defined according to their normal operating status. The anonymity of the network is evaluated using an improved normalized information entropy method that refines anonymity evaluation to the anonymity of each node and expands the dimensionality of evaluation features. This paper compares the effectiveness of our proposed method with static framework information entropy and single indicator methods by evaluating the degree of anonymity provided by a self-built Tor anonymous network under multiple operating scenarios including normal and under attack. Our approach utilizes dynamically changing network anonymity based on multiple anonymous attributes and better reflects the degree of anonymity in anonymous systems.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] Tor network anonymity evaluation based on node anonymity
    Jun Cui
    Changqi Huang
    Huan Meng
    Ran Wei
    [J]. Cybersecurity, 6
  • [2] A Node-labeling-based Method for Evaluating the Anonymity of Tor Network
    Jiang, Feng
    Xia, Yamei
    Yao, Wenbin
    Lu, Tianbo
    Zhang, Xiaoyan
    [J]. 2022 IEEE 46TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2022), 2022, : 773 - 778
  • [3] Improving Performance and Anonymity in the Tor Network
    Panchenko, Andriy
    Lanze, Fabian
    Engel, Thomas
    [J]. 2012 IEEE 31ST INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2012, : 1 - 10
  • [4] Empirical Performance Evaluation of QUIC Protocol for Tor Anonymity Network
    Basyoni, Lamiaa
    Erbad, Aiman
    Alsabah, Mashael
    Fetais, Noora
    Guizani, Mohsen
    [J]. 2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 635 - 642
  • [5] An Anonymity Vulnerability in Tor
    Tan, Qingfeng
    Wang, Xuebin
    Shi, Wei
    Tang, Jian
    Tian, Zhihong
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2022, 30 (06) : 2574 - 2587
  • [6] A-Tor: Accountable Anonymity in Tor
    Cai, Quanwei
    Lutes, Jonathan
    Lin, Jingqiang
    Luo, Bo
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2017, 2018, 238 : 838 - 851
  • [7] Anonymity and Performance Analysis of Stream Isolation in Tor Network
    Kiran, K.
    Chalke, Saurabh S.
    Usman, Mohammad
    Shenoy, P. Deepa
    Venugopal, K. R.
    [J]. 2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [8] Privately Waiting - A Usability Analysis of the Tor Anonymity Network
    Fabian, Benjamin
    Goertz, Florian
    Kunz, Steffen
    Mueller, Sebastian
    Nitzsche, Mathias
    [J]. SUSTAINABLE E-BUSINESS MANAGEMENT, 2010, 58 : 63 - 75
  • [9] Privately Waiting - A Usability Analysis of the Tor Anonymity Network
    Fabian, Benjamin
    Goertz, Florian
    Kunz, Steffen
    Muller, Sebastian
    Nitzsche, Mathias
    [J]. AMCIS 2010 PROCEEDINGS, 2010,
  • [10] Anonymity of Tor: Myth and Reality
    Lazarenko, Aleksandr
    Avdoshin, Sergey
    [J]. CEE-SECR 2016: PROCEEDINGS OF THE 12TH CENTRAL & EASTERN EUROPEAN SOFTWARE ENGINEERING CONFERENCE IN RUSSIA, 2016,