作者: Peter Hannay , Christopher Bolan , John Barker
DOI:
关键词:
摘要: Traditional attacks against anonymous routing systems aim to uncover the identities of those involved, however, a more likely goal attackers is block or degrade network itself, discouraging participation and forcing vulnerable users communicate using less secure means. Since these networks operate on known protocols employ strong encryption it difficult distinguish them from regular traffic. This paper proposes method for identifying traffic belonging by examining their communication patterns. If successful would enable identification Tor usage thus allow directed possible user identification.