Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Management query system and method for hidden communication key node

A technology of key nodes and query methods, applied in the field of information security, can solve problems such as reducing attack efficiency, lack of AS-level attacker defense solutions, and difficulty in ensuring user identity privacy.

Active Publication Date: 2020-05-08
XIDIAN UNIV
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the data is forwarded using layered encryption, a single node cannot obtain the node composition information of the complete link, data management query, but the entry node, as a node that directly communicates with the client, understands and masters the client's real IP and other related networks information, resulting in technical problems: 1. If the entry node is a malicious node deployed by the attacker in the network, then the attacker can grasp the real IP addresses of all users using the entry node, and the attacker can combine traffic correlation attacks, delay Statistics and other technologies conduct deanonymization attacks on users, so an effective key node management and allocation scheme is required to reduce the influence of these malicious nodes in the network on users; it is a key node in the hidden communication network
[0006] 1) According to the node selection and allocation algorithm, a large number of users will choose entry nodes with high performance, but there are still a small number of users who will choose entry nodes with relatively ordinary performance. Due to the small number of users using entry nodes with weak performance, combined with geographical distribution , use time and other factors, it is difficult to guarantee the identity anonymity of these users
[0007] 2) There are major flaws in the existing node set management scheme, which does not consider that the attacker can reduce the attack cost and compromise the key node set by changing the bandwidth of malicious nodes
[0008] 3) None of the existing hidden communication systems considers how to resist traffic hijacking, forwarding, and association attacks initiated by attackers with monitoring AS network levels, and lacks an effective defense scheme against AS-level attackers
[0009] The significance of solving the above technical problems: Solving the above problems can greatly improve the security of the existing low-latency anonymous communication system, blur the user's node usage characteristics, increase the attack cost of the attacker deploying malicious nodes in the network, and reduce the attack efficiency; improve the original There are design flaws in the design of systems that do not adequately consider how to counteract attackers with the ability to monitor large-scale networks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Management query system and method for hidden communication key node
  • Management query system and method for hidden communication key node
  • Management query system and method for hidden communication key node

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0127] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0128] Aiming at the problems existing in the prior art, the present invention provides a management query system and method for concealing key communication nodes. The present invention will be described in detail below in conjunction with the accompanying drawings.

[0129] Such as figure 1 As shown, the management query system for hidden communication key nodes provided by the embodiment of the present invention includes two modules: a key node set management query server and a network user terminal. in:

[0130] Key node set management query server, complete system initialization, provide registration for users, store...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of information security, and discloses a management query system and method for a hidden communication key node. The system comprises a key node set management query server, a network user terminal and a key node terminal. The key node set management query server can provide registration and key distribution services for the network user terminal, generate and manage a key node set and a user set, monitor bandwidth abnormal nodes and provide key node set query services for the network user terminal, the network user terminal can send an encrypted query service request to the key node set management query server, and the key node terminal generates an obfuscated target by adopting a UDP-based data backhaul obfuscation strategy when sending backhaul data to a client, and sends data to the real client and the obfuscated target at the same time. Management query of key nodes and an effective data backhaul confusion scheme are realized, the useridentity hiding performance is improved, and the method is used for enhancing the security of a hidden communication system.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a management query system and method for concealing key communication nodes. Background technique [0002] At present, the closest existing technology: with the exposure of the "Prism Gate" incident, the issue of identity and privacy disclosure of network users has become the focus of attention. Modern anonymous communication systems can be traced back to the Mix-Net design proposed by Chaum. In the subsequent development process, the relay-based anonymous communication system gradually developed into two directions, one is a high-performance anonymous system with a large delay represented by Babel, Mix-master, and Mixminion, and the other is A low-latency anonymization system for the purpose of anonymizing interactive network traffic. [0003] Currently, low-latency anonymous communication systems are widely used around the world. Its communication ar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/08H04L9/32G06K9/62
CPCH04L63/0407H04L63/0421H04L63/1441H04L63/0442H04L9/0819H04L9/3247G06F18/23213
Inventor 朱辉高杨李晖俞志鹏兰玮李鹤麟
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products