Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A traceability method of tor network

A network and data packet technology, applied in the field of dark nets, can solve problems such as difficulties in cybercrime investigation and tracking

Active Publication Date: 2021-04-09
BEIJING INST OF COMP TECH & APPL
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The main purpose of the dark web is to deliberate user identity and communication data information. However, anonymous network communication technology is a double-edged sword, because it not only protects the privacy of normal users, but also brings great challenges to the investigation and tracking of cybercrime. difficulties and severe challenges

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A traceability method of tor network
  • A traceability method of tor network
  • A traceability method of tor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] In order to make the purpose, content, and advantages of the present invention clearer, the specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0013] Figure 1a Shown is the Tor Control Element packet format diagram, Figure 1b Shown is a schematic diagram of the Tor forwarding element data packet format, such as Figure 1a as well as Figure 1b As shown, in the Tor network, the client needs to go through three onion routers to access the server (the English used on the official website is Onion Router), which are the entry node, intermediate node, and exit node, which can be called three hops. Six jumps. The client and the server establish an encrypted communication path after three or six hops, which can be called a Tor link (the English used on the official website is circuit). The data field part of the data packet transmitted on the Tor link is 512 byt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a source tracing method of a Tor network, which includes: initially determining an anonymous server, including: initiating an access to the anonymous server through a controlled client, obtaining information on a node introduced by the server from a directory server, and establishing a Tor network with the imported node Link connection, the controlled client creates a Tor link connection with the controlled appointment node; if all the received element data packets are sorted, the timestamp should conform to the rule from small to large, and the chain of 5 protocol characteristic data packets If the route ID number is also the same, then the IP address of the anonymous server can be preliminarily determined. The invention can destroy the anonymity of the anonymous server and obtain the real address information of the service provider so as to achieve the purpose of supervision.

Description

technical field [0001] The present invention relates to darknet technology, in particular to a source tracing method of Tor network. Background technique [0002] The main purpose of the dark web is to deliberate user identity and communication data information. However, anonymous network communication technology is a double-edged sword, because it not only protects the privacy of normal users, but also brings great challenges to the investigation and tracking of cybercrime. difficulties and severe challenges. Malicious organizations or users conduct some illegal and criminal network activities through the anonymous system. Supervision of the anonymous network will be urgent, there is no absolute "free world", it cannot be left alone, it must be controlled. Onion routing-Tor is the most famous anonymous network application, using onion routing technology as an anonymous system implementation technology to build an anonymous communication system is the most widely used. C...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/26H04L29/06
CPCH04L43/10H04L63/30
Inventor 王硕单联强夏旸刘康涛
Owner BEIJING INST OF COMP TECH & APPL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products