350 rub
Journal Radioengineering №9 for 2012 г.
Article in number:
Deanonimizating algorithms of internet users
Authors:
V.E. Dementiev, A.Y. Putsev
Abstract:
Rapid growth of the Internet has also the negative side assotiated with the ever-increasing damage caused by the misuse of Internet resources. This problem is caused by lot of ways of anonymous use of a global network. Among them it is possible to note technologies of use of proxy servers, vpn-connections and anonimizing networks. When using this methods there is no guaranteed possibility to identify the author of session, so, there is no possibility to stop an offense. Monitoring systems of a traffic SORM is updated for identification of malefactors, so this provides remote management of these systems from the uniform center. This updating does essentially possible procedure of comparison of a traffic directly on knot of the malefactor and the target server. However there are no algorithms now allowing to compare the traffic target and modified by various ways with high degree of reliability and in the sufficient speed. Existing methods of identification of malefactors on the Internet are focused on the analysing service data of a stack of data transmission protocols TCP/IP. Meanwhile works of domestic and foreign researchers show that for achievement of the best indicators at identification of a sample of a traffic it is necessary to estimate statistical characteristics of a traffic. It causes a high urgency of the task connected with synthesis and the analysis of statistical algorithms of a deanonimizing in public networks. Results of development and research of the procedures allowing with high reliability to define a source of a traffic are given in this article. The carried-out researches have shown the principal possibility of realization of these algorithms in real communication networks in the conditions of processing a significant amount of multiplexed traffic.
Pages: 27-30
References
  1. Деарт В. Ю., Маньков В. А., Пилюгин А. В.Статистические характеристики трафика современного провайдера доступа в интернет // «T-Comm: Телекоммуникации и транспорт». 2008. № 4. С. 54 - 57.
  2. Design principles for low latency anonymous network systems secure against timing attacks: Rungrat Wiangsripanawan, Willy Susilo and Rei Safavi-Naini. http://crpit.com/confpapers/CRPITV68Wiangsripanawan.pdf
  3. Васильев К. К., Крашенинников В. Р. Методы фильтрации многомерных случайных полей. Саратов: СГУ. 1990. 124 с.
  4. Гонсалес Р., Вудс Р. Цифровая обработка изображений. М: Техносфера. 2005. 1072 с.
  5. Комаров А. За гранью невидимости: новые методы сохранить инкогнито в интернете. «Хакер». 2008. № 12. С.26 - 29.
  6. Leland W., Taqqu M., Willinger W., Wilson D. On the Self-Similar Nature of Ethernet Traffic (Extended version) // IEEE/ACM Transaction on Networing, February 1994.