English  |  正體中文  |  简体中文  |  Items with full text/Total items : 65275/65275 (100%)
Visitors : 20971277      Online Users : 234
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://ir.lib.ncu.edu.tw/handle/987654321/63536


    Title: 攻擊洋蔥路由匿名網路使用者之研究;The research of attacking TOR network users
    Authors: 黃郁偉;Huang,Yu-wei
    Contributors: 資訊工程學系在職專班
    Keywords: 洋蔥路由;匿名網路;中間人攻擊;殭屍網路;Tor;Anonymity Network;Man-in-the-middle Attack;Botnet
    Date: 2014-01-28
    Issue Date: 2014-04-02 15:47:26 (UTC+8)
    Publisher: 國立中央大學
    Abstract: 洋蔥路由匿名網路的主要功能是為了保護使用者在網際網路上的隱私性,並且除了隱匿客戶端的網路IP位址之外,還能夠作為突破某些資訊封鎖、過濾或監視網路環境的工具,可以讓使用者安全地進行隱匿通訊。
    在本篇論文中,我們主要的研究目的是想了解在使用洋蔥路由匿名網路時,使用者會遭遇到哪些潛在的資安風險與弱點威脅。因此,我們嘗試以攻擊者的角度切入來找出這個問題的答案,利用洋蔥路由匿名網路的系統架構並結合中間人攻擊的概念,設計了一個可實際運作、具高度隱匿性且能被動式地對客戶端策動攻擊行動的實驗系統架構來進行相關實作。
    透過本篇論文的研究過程及實驗結果,我們討論實驗系統架構的影響範圍,並依據最終的實驗數據資料,分析使用洋蔥路由匿名網路的安全性及潛在的資安威脅與風險。最後,討論目前現有之防禦方法及未來可研究的方向並總結全文。; The main function of Tor anonymity network is to protect the privacy of internet users. In addition to hiding the IP addresses of Tor clients, it is also a tool to make a breakthrough in the environment of information blocking, filtering and monitoring. Tor users can use it to do a secret communication securely.
    In this thesis, our research purpose is to know that user encounters what the information security risks and the threat of the weakness when they use Tor anonymity network. Consequently, we try to use the thinking of the attackers to find out this answer of this question. We use the network architecture of Tor anonymity network and the concept of man-in-the-middle attack to design an experimental architecture which is high anonymity and attacks users passively to do related implement.
    We discuss the scope of affecting according to our research and the experimental results in this thesis, and we analysis the security of Tor anonymity network and the potential risks and threats by the final experimental data. Finally, we discuss the current methods of defense and the future work, and make conclusions.
    Appears in Collections:[資訊工程學系碩士在職專班 ] 博碩士論文

    Files in This Item:

    File Description SizeFormat
    index.html0KbHTML575View/Open


    All items in NCUIR are protected by copyright, with all rights reserved.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback  - 隱私權政策聲明