Tor network anonymity evaluation based on node anonymity

被引:0
|
作者
Cui, Jun [1 ,2 ,3 ]
Huang, Changqi [1 ,2 ,3 ]
Meng, Huan [4 ]
Wei, Ran [5 ]
机构
[1] Tiangong Univ, Sch Life Sci, 399 Binshui West Rd, Tianjin 300387, Peoples R China
[2] Tianjin Engn Res Ctr Biomed Elect Technol, Tianjin 300387, Peoples R China
[3] Tianjin Key Lab Qual Control & Evaluat Technol Med, Tianjin 300387, Peoples R China
[4] Tiangong Univ, Sch Elect & Informat Engn, Tianjin 300387, Peoples R China
[5] Beijing Coll Social Adm, Minist Civil Affairs, Training Ctr, Dept Rehabil Engn, Beijing 102600, Peoples R China
关键词
Node anonymity; Behavioral baseline; Network anonymity; Self-built Tor network; Dynamic evaluation;
D O I
10.1186/s42400-023-00191-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to address the shortcomings of traditional anonymity network anonymity evaluation methods, which only analyze from the perspective of the overall network and ignore the attributes of individual nodes, we proposes a dynamic anonymity model based on a self-built anonymous system that combines node attributes, network behavior, and program security monitoring. The anonymity of evaluation nodes is assessed based on stable intervals and behavior baselines defined according to their normal operating status. The anonymity of the network is evaluated using an improved normalized information entropy method that refines anonymity evaluation to the anonymity of each node and expands the dimensionality of evaluation features. This paper compares the effectiveness of our proposed method with static framework information entropy and single indicator methods by evaluating the degree of anonymity provided by a self-built Tor anonymous network under multiple operating scenarios including normal and under attack. Our approach utilizes dynamically changing network anonymity based on multiple anonymous attributes and better reflects the degree of anonymity in anonymous systems.
引用
收藏
页数:16
相关论文
共 50 条
  • [21] Evaluation indicators and model of network technical anonymity
    [J]. 1600, Science and Engineering Research Support Society, 20 Virginia Court, Sandy Bay, Tasmania, Australia (06):
  • [22] The Causality Test of Network Technical Anonymity and Perceptive Anonymity
    Chen, Xi
    Li, Yujie
    [J]. INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2016, 9 (03): : 279 - 287
  • [23] Anonymity communication VPN and Tor: a comparative study
    Ramadhani, E.
    [J]. INTERNATIONAL CONFERENCE ON MATHEMATICS, SCIENCE AND EDUCATION 2017 (ICMSE2017), 2018, 983
  • [24] Evaluation Indicators and Model of Network Technical Anonymity
    Chen, Xi
    Li, Gang
    [J]. INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2013, 6 (04): : 181 - 192
  • [25] Seeking anonymity on the Internet: The knowledge accumulation process and global usage of the Tor network
    Chen, Zhicong
    Jardine, Eric
    Liu, Xiao Fan
    Zhu, Jonathan J. H.
    [J]. NEW MEDIA & SOCIETY, 2024, 26 (02) : 1074 - 1095
  • [26] An architecture for an anonymity network
    Rennhard, M
    Rafaeli, S
    Mathy, L
    Plattner, B
    Hutchison, D
    [J]. PROCEEDINGS OF THE TENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, 2001, : 165 - 170
  • [27] DiffuseNet: A Random Walk Based Anonymity Network
    Fleming, Charles
    Zhou, Xing
    Liu, Dawei
    Liang, Haining
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATIONS AND COMPUTING (ICSPCC), 2014, : 877 - 880
  • [28] Breaking Tor anonymity with game theory and data mining
    Wagner, Cynthia
    Wagener, Gerard
    State, Radu
    Dulaunoy, Alexandre
    Engel, Thomas
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2012, 24 (10): : 1052 - 1065
  • [29] Discussing Anonymity Metrics for Mix Based Anonymity Approaches
    Dang Vinh Pham
    Wright, Joss
    [J]. INETSEC 2009 - OPEN RESEARCH PROBLEMS IN NETWORK SECURITY, 2009, 309 : 149 - 168
  • [30] Relay Recommendation System (RRS) and Selective Anonymity for Tor
    Li, Chenglong
    Xue, Yibo
    Dong, Yingfei
    Wang, Dongsheng
    [J]. 2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 833 - 838