高级检索
    孙学良, 黄安欣, 罗夏朴, 谢怡. 针对Tor的网页指纹识别研究综述[J]. 计算机研究与发展, 2021, 58(8): 1773-1788. DOI: 10.7544/issn1000-1239.2021.20200498
    引用本文: 孙学良, 黄安欣, 罗夏朴, 谢怡. 针对Tor的网页指纹识别研究综述[J]. 计算机研究与发展, 2021, 58(8): 1773-1788. DOI: 10.7544/issn1000-1239.2021.20200498
    Sun Xueliang, Huang Anxin, Luo Xiapu, Xie Yi. Webpage Fingerprinting Identification on Tor: A Survey[J]. Journal of Computer Research and Development, 2021, 58(8): 1773-1788. DOI: 10.7544/issn1000-1239.2021.20200498
    Citation: Sun Xueliang, Huang Anxin, Luo Xiapu, Xie Yi. Webpage Fingerprinting Identification on Tor: A Survey[J]. Journal of Computer Research and Development, 2021, 58(8): 1773-1788. DOI: 10.7544/issn1000-1239.2021.20200498

    针对Tor的网页指纹识别研究综述

    Webpage Fingerprinting Identification on Tor: A Survey

    • 摘要: 随着Web服务的发展,以匿名网络为代表的互联网隐私保护技术越来越受到重视.用户可以通过匿名网络隐藏真实的访问目标,在互联网上匿名浏览网页.然而网页指纹识别仍能通过监听和分析网络流量判断出用户真实的访问目标,从而破坏匿名性.因此,网页指纹识别的方法也能对匿名网络实施监管和审查,避免不法分子滥用隐私保护技术进行非法活动或掩盖罪行.无论从隐私保护还是网络监管的角度来说,网页指纹识别都是值得重点关注的技术手段.在介绍网页指纹识别的概念和发展基础上,针对最有代表性的匿名系统Tor,重点阐述和分析面向单标签和面向多标签的2类网页指纹识别,并讨论其工作原理、性能特点和局限性(例如过于简化的研究假设和缺乏系统的实验评估).最后总结和展望网页指纹识别的未来发展方向.

       

      Abstract: With the prosperous development of Web services, protecting Web-surfing privacy has become a significant concern to society. Various protection techniques (e.g., anonymous communication networks) have been proposed to help users hide the real access targets and anonymously browse the Internet. However, Webpage fingerprinting (WF) identifications, through monitoring and analyzing network traffic, can still determine whether a Web page is visited by exploiting network traffic features, thus jeopardizing the anonymity. On the other hand, law enforcement agencies can leverage the methods of WF identification to monitor anonymous networks to prevent abusing them for carrying out illegal activities or covering up crimes. Therefore, WF identification is a significant and noteworthy technique for privacy protection and network supervision. In this survey, we first introduce the concept and development of WF identifications, and then focus on two kinds of WF identifications on Tor, a widely used anonymous network, including single-tag oriented identifications and multi-tag oriented identifications. In particular, the characteristics of these WF identifications are analyzed and these WF limitations are pointed out, such as simplistic assumptions and insufficient experiments for systematical evaluation. Finally, future research directions for WF identifications are concluded.

       

    /

    返回文章
    返回