Radiotekhnika
Publishing house Radiotekhnika

"Publishing house Radiotekhnika":
scientific and technical literature.
Books and journals of publishing houses: IPRZHR, RS-PRESS, SCIENCE-PRESS


Тел.: +7 (495) 625-9241

 

Aggregate model for the functioning of anonymous network TOR

DOI 10.18127/j19998465-201810-06

Keywords:

K.V. Sazonov – Dr.Sc.(Eng.), Associate Professor, Mozhaysky Military Space Academy (Saint Petersburg)
D.A. Tavalinskiy – Dr.Sc.(Eng.), Associate Professor, Cherepovets Higher Military Engineering School of Radio Electronics
E-mail: cvviur2@mil.ru
P.N. Markov – Post-graduate Student, Mozhaysky Military Space Academy (Saint Petersburg)


In connection with changes in the legislation in the sphere of control over Internet information and restriction of the use of access technologies to sites that are classified as prohibited by Roskomnadzor, it is required to solve problems on the detection of the use of these technologies. Such tasks are solved by systems of deep packet analysis in global traffic. An example of access to closed sites is the widely spread anonymous TOR network.
The TOR network is a complex system in its scale. Anonymous network includes both users, and network elements that form the network itself and are responsible for the transfer of information within the network and its operation. The network is controlled by the specific protocol of the anonymous TOR network, using the existing protocols of the reference model of interaction of open systems.
There are many different models of traffic analysis in information transmission systems that describe the behavior of traffic flows in terms of the quality of service system. When solving the problems of deep packet analysis in traffic control systems, a set of knowledge is required about information data blocks that allow you to determine the type of protocols used and the nature of the transmitted information in the general digital stream. The considered anonymous network is an overlay and, accordingly, information packets of this network are transmitted in the general network traffic.
The article suggests an approach to modeling an anonymous network using the theory of aggregative systems. Such a way of repre-sentation allows to consider an anonymous network as a set of simple subsystems that are formed directly by the network elements and nodes, and also by a set of interaction rules between network members using existing TCP/IP protocols.

References:
  1. The Tor Project [Official web site]. URL = http://www.torproject.org (accessed 18.06.2017).
  2. TorMetrics [Official web site]. URL = https://metrics.torproject.org (accessed 18.06.2017).
  3. Olifer V.G., Olifer N.A. Komp'juternye seti. Principy, tehnologii, protokoly. SPb.: Piter. 2012. 943 p.
  4. Tanenbaum Je.S. Komp'juternye seti. Izd. 4-e. SPb.: Piter. 2003. 992 p.
  5. Paramonov A.I. Modeli potokov trafika dlja setej M2M // Jelektrosvjaz'. 2014. № 4. P. 9−14.
  6. Basharin G.P., Gajdamaka Ju.V., Samujlov K.E. Matematicheskaja teorija teletrafika i ee prilozhenija k analizu mul'tiservisnyh setej svjazi sledujushhih pokolenij // Avtomatika i vychislitel'naja tehnika. Riga. 2013. № 2. P. 11−21.
  7. Krylov V.V., Samohvalova S.S. Teorija teletrafika i ee prilozhenija. SPb.: BHV-Peterburg. 2005. 288 p.
  8. Cimbal V.A. i dr. Matematicheskaja model' dostavki mnogopaketnyh soobshhenij v soedinenii «tochka-tochka» na seti peredachi dannyh s proceduroj «skol'zjashhie okno» // Izvestija IIF. № 3. 2009.
  9. Piterson Dzh. Teorijasetej Petri i modelirovanie sistem. M.: Mir. 1984. 264 p.
  10. Markov A.A. Modelirovanie informacionno-vychislitel'nyh processov. M.: Izd-vo MGTU im. N.Je. Baumana. 1999. 360 p.
  11. Buslenko N.P. Modelirovanie slozhnyh sistem. M.: Nauka. 1978. 400 p.
  12. Rykov V.V. Dvapodhoda k dekompozicii slozhnyh sistem. Agregativnye sistemy // Avtomatika i telemehanika. 1997. № 12. P. 140−149.
  13. Matematicheskoe modelirovanie: Metody, opisanija i issledovanija slozhnyh sistem / Pod red. A.A. Samarskogo. M.: Nauka. 1989. 128 p.
  14. Roger Dingledine, Nick Mathewson and Paul Syverson Tor: The Second-Generation Onion Router. Onion router [Official web site]. URL = http://www.onion-router.net/Publications/tor-design.pdf (accessed 20.06.2017).
  15. Kucherjavyj A.E., Gil'chenok L.Z., Revelova Z.B., Ivanov A.Ju. Perspektivnye reshenija po razdeleniju trafika seti svjazi obshhego pol'zovanijai Internet // Jelektrosvjaz'. 2000. № 5. P. 23−25.
  16. Kucherjavyj A.E., Gil'chenok L.Z., Ivanov A.Ju. Paketnaja set' svjazi obshhego pol'zovanija. SPb.: Nauka i tehnika. 2004. 272 p.
  17. The Perils of Deep Packet Inspection. URL = http://www.symantec.com/connect/articles/ perilsdeep-packet-inspection (accessed 01.06.2017).
  18. Platformy glubokogo analiza trafika i upravlenija trafikom prilozhenij. URL = http://www.inlinetelecom.ru/solutions/access_network/ platform_depth_analysis_of_traffic_and_traffic_control_applications/ (accessed 01.06.2017).
May 29, 2020

© Издательство «РАДИОТЕХНИКА», 2004-2017            Тел.: (495) 625-9241                   Designed by [SWAP]Studio