바로가기메뉴

본문 바로가기 주메뉴 바로가기

ACOMS+ 및 학술지 리포지터리 설명회

  • 한국과학기술정보연구원(KISTI) 서울분원 대회의실(별관 3층)
  • 2024년 07월 03일(수) 13:30
 

Tor 사용자 추적 기술 동향에 관한 연구

A Research on User Tracing Technologies in Tor

한국사물인터넷학회논문지 / Journal of The Korea Internet of Things Society, (P)2466-0078;
2022, v.8 no.5, pp.111-117
https://doi.org/https://doi.org/10.20465/kiots.2022.8.5.111
한경현 (홍익대학교(세종캠퍼스))
황성운 (가천대학교)
  • 다운로드 수
  • 조회수

초록

익명 네트워크는 감시나 트래픽 추적을 피하기 위한 정보통신 보호를 목적으로 설계된 네트워크이다. 그러나최근에는 이러한 특성을 악용하여 사이버 범죄자들이 익명 네트워크를 활용하여 사이버 범죄를 일으키고, 사법 당국의추적을 회피하고 있다. 본 논문에서는 익명 네트워크 중 하나인 Tor를 중심으로 관련 연구를 조사한다. 본 논문은 Tor 가 어떻게 익명성을 제공하는지 소개하고, Tor를 대상으로 어떻게 사용자를 추적할 수 있는지 소개한다. 또한 각 추적기술을 비교 분석하였으며, 연구자가 실험 환경을 어떻게 구축할 수 있는지 설명한다.

keywords
익명 네트워크, 토르, 추적 기술, 실험 환경 구축, Anonymous Networks, Tor, Tracing Technology

Abstract

Anonymous networks are designed to protect information and communication by avoiding monitoring or tracking traffic. In recent years, however, cybercriminals have evaded law enforcement tracking by exploiting the characteristics of anonymous networks. In this paper, we investigate related research focusing on Tor, one of the anonymous networks. This paper introduces how Tor provides anonymity, and how tracing technologies can track users against Tor. In addition, we compare and analyze tracing techniques, and explain how a researcher can establish an experimental environment.

keywords
익명 네트워크, 토르, 추적 기술, 실험 환경 구축, Anonymous Networks, Tor, Tracing Technology

참고문헌

1.

Norwich University Online, Deep Web Crime Requires New Forensic Approaches[Internet], https://online.norwich.edu/academic-programs/resou rces/deep-web-crime-requires-new-forensic-approac hes

2.

S. C. Jang, “Basic Study on the IoT Micro Boiler,”Journal of Internet of Things and Convergence, Vol.8, No.1, pp.23-29, 2022.

3.

T. K. Kim, “IoT (Internet of Things)-based Smart Trash Can,” Journal of Internet of Things and Convergence, Vol.6, No.1, pp.17-22, 2020.

4.

S. Lee and K. Cho, “Seeking an Approach to Youth Job Search Allowance Support Project using IoT in the Untact Era,” Journal of Internet of Things and Convergence, Vol.6, No.3, pp.21-30, 2020.

5.

I. G. Han, J. H. Yeon, H. Y. Lee and H. J. Kim, “Concept of a Layer for Privacy Protection of Upstream Communications in IoT Environments,” In Proceedings of the Korea Information Processing Society Conference, pp. 468-469, 2019.

6.

Tor Network Reachs Internet of Things[Internet], https://www.hwlibre.com/ko/la-red-tor-llega-al-inter net-las-cosas/

7.

E. Erdin, C. Zachor and M. H. Gunes, "How to find hidden users: A survey of attacks on anonymity networks," IEEE Communications Surveys & Tutorials, Vol.17, No.4, pp.2296-2316, 2015.

8.

A. Houmansadr, N. Kiyavash and N. Borisov, "Non-Blind Watermarking of Network Flows," IEEE/ACM Transactions on Networking, Vol.22, No.4, pp.1232-1244, 2013.

9.

A. Houmansadr and N. Borisov, "SWIRL: A Scalable Watermark to Detect Correlated Network Flows," In NDSS, 2011.

10.

X. Wang, J. Luo, M. Yang and Z. Ling, "A novel flow multiplication attack against Tor,"?In 2009 13th International Conference on Computer Supported Cooperative Work in Design, Santiago, pp.686-691, 2009, Dissertations.

11.

Z. Ling, J. Luo, W. Yu, X. Fu, D. Xuan and W. Jia, "A New Cell-Counting-Based Attack Against Tor," in IEEE/ACM Transactions on Networking, Vol.20, No.4, pp.1245-1261, 2012.

12.

Z. Ling, X. Fu, W. Jia, W. Yu and D. Xuan, “Novel packet size based covert channel attack against anonymizer," IEEE Transactions on Computers, Vol.62, pp. 186-190, 2013.

13.

Z. Ling, J. Luo, W. Yu, X. Fu, W. Jia and W. Zhao, "Protocol-level attacks against Tor," Computer Networks, Vol.57, No.4, pp.869-886, 2013.

14.

K. Kiran, S. Saurabh, M. Usman, P. D. Shenoy and K. R. Venugopal, "Anonymity and performance analysis of stream isolation in tor network," In 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT) pp.1-6, 2019.

15.

Rob Jansen, New Foundations for Tor Network Experimentation[Internet], https://blog.torproject.org/new-foundations-tor-netw ork-experimentation/

한국사물인터넷학회논문지