CASPIAN JOURNAL

MANAGEMENT AND HIGH TECHNOLOGIES

MODERN METHODS OF ATTACS OF DEANIMONIZATION ON THE TOR NETWORK

Read Novoseltseva Alena V., Klyuev Stanislav G. MODERN METHODS OF ATTACS OF DEANIMONIZATION ON THE TOR NETWORK // Caspian journal : management and high technologies. — 2020. — №1. — pp. 155-161.

Novoseltseva Alena V. - Krasnodar University of the Ministry of Internal Affairs of the Russian Federation, AlenaNov98@mail.ru

Klyuev Stanislav G. - Krasnodar University of the Ministry of Internal Affairs of the Russian Federation, s.g.klyuev@mail.ru

This article presents modern methods of deanonymization attacks on the anonymous Tor network, and also proposes their classification. The principles of node interaction and the construction of the onion routing chain of the Tor network are studied. Attacks on the client side of the network (Raptor attack, Torben attack), attacks on the server (attack marked with cells, Off - path MitM) and attacks on the channel (Timing - attack, CellFlood DoS-attack) are considered in more detail. Also considered attack depending on exposure to intercept traffic (active attacks, in which there is traffic modification and passive attacks, in which traffic is simply intercepted and analyzed, but not modified). Examples (precedents) of some attacks and consequences are given. The conclusion is drawn about the high importance of the availability of large computing power and resources in the implementation of all types of attacks.

Key words: анонимные сети, CellFlood DoSатака, Tor, анализ тpафика, деанонимизация, луковая маршрутизация, коррумпированные узлы, даркнет, anonymous networks, CellFlood DoS-attack, Tor, traffic analysis, deanonymization, onion routing, corrupt nodes, darknet