期刊名称:International Journal of Security and Its Applications
印刷版ISSN:1738-9976
出版年度:2016
卷号:10
期号:4
页码:95-104
DOI:10.14257/ijsia.2016.10.4.11
出版社:SERSC
摘要:Network security in the traditional sense consists of the following four elements: secret, integrity, availability and authenticity. Recent studies have indicated that: anonymity, as an important indicator of information security. In recent years, the research shows that: anonymity is also gradually being the important indicator of information security. With the rapid development of communication technology and the Internet, people pay more and more attention to personal privacy. As a result, the research on anonymous communication system is gradually increasing. P2P network's openness and the unpredictability of malicious nodes make the network user's privacy information more vulnerable to illegal theft. The attacker can not only get the contents of the file, but also can get the identity and other related privacy information of the sender and receiver. Anonymous technology is the best way to solve the privacy protection. Therefore, it is of important theoretical significance and application value to study the anonymous technology in P2P network environment. However, with the development of anonymous technology, P2P network attack technology has become the focus of research. This paper mainly analyzes the typical active attack technology.
关键词:anonymous communication system ; , ; the typical active attack technology