高级检索
    刘培朋, 王丽宏, 时金桥, 谭庆丰. 匿名网络I2P路径选择的安全性分析[J]. 计算机研究与发展, 2014, 51(7): 1555-1564.
    引用本文: 刘培朋, 王丽宏, 时金桥, 谭庆丰. 匿名网络I2P路径选择的安全性分析[J]. 计算机研究与发展, 2014, 51(7): 1555-1564.
    Liu Peipeng, Wang Lihong, Shi Jinqiao, Tan Qingfeng. Towards Analysis of Security in I2P’s Path Selection[J]. Journal of Computer Research and Development, 2014, 51(7): 1555-1564.
    Citation: Liu Peipeng, Wang Lihong, Shi Jinqiao, Tan Qingfeng. Towards Analysis of Security in I2P’s Path Selection[J]. Journal of Computer Research and Development, 2014, 51(7): 1555-1564.

    匿名网络I2P路径选择的安全性分析

    Towards Analysis of Security in I2P’s Path Selection

    • 摘要: 随着人们隐私保护意识的提高,匿名通信系统获得了越来越多的关注.I2P(invisible Internet project)是当前应用最广泛的匿名通信系统之一,与Tor(另一种非常流行的匿名通信系统)网络类似,I2P采用大蒜路由的方式隐藏通信双方的通信关系,即通过使用包含多个节点的隧道,使得隧道中的任意单一节点都不能同时获知通信双方的身份信息.然而,如果能够共谋同一隧道的两端节点或是能同时观察到I2P通信链路进、出I2P网络的流量,攻击者依然可以通过流量分析的方法对通信的双方进行关联,进而破坏I2P网络的匿名性.通过分别从I2P网络内部攻击者和传输路径上外部网络攻击者的角度,对当前I2P路径选择过程中可能面临的共谋攻击威胁进行分析,结果显示,I2P网络当前的路径选择算法并不能有效地防范内部攻击者和外部网络攻击者,I2P网络的匿名性仍然面临着巨大的共谋攻击威胁.

       

      Abstract: With the growing concerns for privacy, anonymous communication has been getting more and more attentions. One of the most popular anonymous communication systems is the invisible Internet project (I2P). Similar with the onion router (Tor, the most popular anonymous communication system), I2P uses garlic routing to protect the identities of both sides of a communication. The implementation of garlic routing in I2P is called tunnel, and a tunnel usually contains three hops, so every single hop in the tunnel can’t get the identities of both the sender and recipient. However, if an attacker can compromise the two endpoints of a tunnel or can simultaneously observe the traffics entering and leaving the I2P network, the attacker can use traffic analysis to correlate the sender and recipient of an I2P communication. This paper makes an analysis of security in I2P’s path selection from the perspectives of both an internal attacker and a network attacker. The results show that there still exist potential threats against I2P’s anonymity given the current I2P’s path selection algorithm.

       

    /

    返回文章
    返回