Approach to Recognition of Malicious Servers of TOR Anonymization Network Based on Cluster Analysis
Problems of secure communications on the Internet and anonymous access to network resources are considered. A problem is revealed, which involves an increase in the probability of deanonymization of TOR network users when using the servers under common administrative control in one chain. An approac...
Gespeichert in:
Veröffentlicht in: | Automatic control and computer sciences 2021-12, Vol.55 (8), p.1209-1214 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Problems of secure communications on the Internet and anonymous access to network resources are considered. A problem is revealed, which involves an increase in the probability of deanonymization of TOR network users when using the servers under common administrative control in one chain. An approach to recognition of “hidden groups” of servers of TOR anonymization network through analysis of the server characteristics frequency and their clustering based on similarity is suggested. These studies demonstrate the approaches to improve software of the TOR anonymization network and increase user security. |
---|---|
ISSN: | 0146-4116 1558-108X |
DOI: | 10.3103/S0146411621080411 |