Approach to Recognition of Malicious Servers of TOR Anonymization Network Based on Cluster Analysis

Problems of secure communications on the Internet and anonymous access to network resources are considered. A problem is revealed, which involves an increase in the probability of deanonymization of TOR network users when using the servers under common administrative control in one chain. An approac...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Automatic control and computer sciences 2021-12, Vol.55 (8), p.1209-1214
Hauptverfasser: Nefedov, V. S., Kriulin, A. A., Eremeev, M. A.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Problems of secure communications on the Internet and anonymous access to network resources are considered. A problem is revealed, which involves an increase in the probability of deanonymization of TOR network users when using the servers under common administrative control in one chain. An approach to recognition of “hidden groups” of servers of TOR anonymization network through analysis of the server characteristics frequency and their clustering based on similarity is suggested. These studies demonstrate the approaches to improve software of the TOR anonymization network and increase user security.
ISSN:0146-4116
1558-108X
DOI:10.3103/S0146411621080411