DOI QR코드

DOI QR Code

Tor 사용자 추적 기술 동향에 관한 연구

A Research on User Tracing Technologies in Tor

  • 한경현 (홍익대학교 전자전산공학과) ;
  • 황성운 (가천대학교 컴퓨터공학과)
  • Han, KyungHyun (Department of Electronics and Computer Engineering, Hongik University) ;
  • Hwang, Seong Oun (Department of Computer Engineering, Gachon University)
  • 투고 : 2022.07.25
  • 심사 : 2022.09.22
  • 발행 : 2022.10.31

초록

익명 네트워크는 감시나 트래픽 추적을 피하기 위한 정보통신 보호를 목적으로 설계된 네트워크이다. 그러나 최근에는 이러한 특성을 악용하여 사이버 범죄자들이 익명 네트워크를 활용하여 사이버 범죄를 일으키고, 사법 당국의 추적을 회피하고 있다. 본 논문에서는 익명 네트워크 중 하나인 Tor를 중심으로 관련 연구를 조사한다. 본 논문은 Tor가 어떻게 익명성을 제공하는지 소개하고, Tor를 대상으로 어떻게 사용자를 추적할 수 있는지 소개한다. 또한 각 추적 기술을 비교 분석하였으며, 연구자가 실험 환경을 어떻게 구축할 수 있는지 설명한다.

Anonymous networks are designed to protect information and communication by avoiding monitoring or tracking traffic. In recent years, however, cybercriminals have evaded law enforcement tracking by exploiting the characteristics of anonymous networks. In this paper, we investigate related research focusing on Tor, one of the anonymous networks. This paper introduces how Tor provides anonymity, and how tracing technologies can track users against Tor. In addition, we compare and analyze tracing techniques, and explain how a researcher can establish an experimental environment.

키워드

과제정보

이 논문은 2022년 정부(방위사업청)의 재원으로 국방과학연구소의 지원을 받아 수행된 연구임(UI220040XD)

참고문헌

  1. Norwich University Online, Deep Web Crime Requires New Forensic Approaches[Internet], https://online.norwich.edu/academic-programs/resources/deep-web-crime-requires-new-forensic-approaches
  2. S. C. Jang, "Basic Study on the IoT Micro Boiler," Journal of Internet of Things and Convergence, Vol.8, No.1, pp.23-29, 2022. https://doi.org/10.20465/KIOTS.2022.8.1.023
  3. T. K. Kim, "IoT (Internet of Things)-based Smart Trash Can," Journal of Internet of Things and Convergence, Vol.6, No.1, pp.17-22, 2020.
  4. S. Lee and K. Cho, "Seeking an Approach to Youth Job Search Allowance Support Project using IoT in the Untact Era," Journal of Internet of Things and Convergence, Vol.6, No.3, pp.21-30, 2020.
  5. I. G. Han, J. H. Yeon, H. Y. Lee and H. J. Kim, "Concept of a Layer for Privacy Protection of Upstream Communications in IoT Environments," In Proceedings of the Korea Information Processing Society Conference, pp. 468-469, 2019.
  6. Tor Network Reachs Internet of Things[Internet], https://www.hwlibre.com/ko/la-red-tor-llega-al-internet-las-cosas/
  7. E. Erdin, C. Zachor and M. H. Gunes, "How to find hidden users: A survey of attacks on anonymity networks," IEEE Communications Surveys & Tutorials, Vol.17, No.4, pp.2296-2316, 2015. https://doi.org/10.1109/COMST.2015.2453434
  8. A. Houmansadr, N. Kiyavash and N. Borisov, "Non-Blind Watermarking of Network Flows," IEEE/ACM Transactions on Networking, Vol.22, No.4, pp.1232-1244, 2013. https://doi.org/10.1109/tnet.2013.2272740
  9. A. Houmansadr and N. Borisov, "SWIRL: A Scalable Watermark to Detect Correlated Network Flows," In NDSS, 2011.
  10. X. Wang, J. Luo, M. Yang and Z. Ling, "A novel flow multiplication attack against Tor,"?In 2009 13th International Conference on Computer Supported Cooperative Work in Design, Santiago, pp.686-691, 2009, Dissertations.
  11. Z. Ling, J. Luo, W. Yu, X. Fu, D. Xuan and W. Jia, "A New Cell-Counting-Based Attack Against Tor," in IEEE/ACM Transactions on Networking, Vol.20, No.4, pp.1245-1261, 2012. https://doi.org/10.1109/TNET.2011.2178036
  12. Z. Ling, X. Fu, W. Jia, W. Yu and D. Xuan, "Novel packet size based covert channel attack against anonymizer," IEEE Transactions on Computers, Vol.62, pp. 186-190, 2013. https://doi.org/10.1109/TC.2011.208
  13. Z. Ling, J. Luo, W. Yu, X. Fu, W. Jia and W. Zhao, "Protocol-level attacks against Tor," Computer Networks, Vol.57, No.4, pp.869-886, 2013. https://doi.org/10.1016/j.comnet.2012.11.005
  14. K. Kiran, S. Saurabh, M. Usman, P. D. Shenoy and K. R. Venugopal, "Anonymity and performance analysis of stream isolation in tor network," In 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT) pp.1-6, 2019.
  15. Rob Jansen, New Foundations for Tor Network Experimentation[Internet], https://blog.torproject.org/new-foundations-tor-network-experimentation/