Abstract
AbstractIn order to address the shortcomings of traditional anonymity network anonymity evaluation methods, which only analyze from the perspective of the overall network and ignore the attributes of individual nodes, we proposes a dynamic anonymity model based on a self-built anonymous system that combines node attributes, network behavior, and program security monitoring. The anonymity of evaluation nodes is assessed based on stable intervals and behavior baselines defined according to their normal operating status. The anonymity of the network is evaluated using an improved normalized information entropy method that refines anonymity evaluation to the anonymity of each node and expands the dimensionality of evaluation features. This paper compares the effectiveness of our proposed method with static framework information entropy and single indicator methods by evaluating the degree of anonymity provided by a self-built Tor anonymous network under multiple operating scenarios including normal and under attack. Our approach utilizes dynamically changing network anonymity based on multiple anonymous attributes and better reflects the degree of anonymity in anonymous systems.
Funder
Tianjin Municipal Education Commission
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Computer Networks and Communications,Information Systems,Software
Reference39 articles.
1. Backes M, Kate A, Meiser S, Mohammadi E (2014) (nothing else) mator
2. (s) monitoring the anonymity of Tor's path selection. In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, pp 513-524
3. Basyoni L, Erbad A, Alsabah M, Fetais N, Mohamed A, Guizani M (2021) QuicTor: Enhancing tor for real-time communication using QUIC transport protocol. IEEE Access 9:28769–28784
4. Berthold O, Federrath H, Köpsell S (2001) Web mixes: a system for anonymous and unobservable internet access. In: Designing privacy enhancing technologies: international workshop on design issues in anonymity and unobservability Berkeley, Springer, pp. 115–129
5. Buccafurri F, De Angelis V, Idone MF, Labrini C, Lazzaro S (2021) Achieving sender anonymity in tor against the global passive adversary. Appl Sci 12(1):137
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献