Tor-verkon piilotettujen palveluiden deanonymisointi

Tor-verkon avulla on mahdollista ylläpitää sijainniltaan suojattuja piilotettuja palveluita, joita käytetään laillisten tarkoitusperien lisäksi myös rikollisiin tarkoituksiin. Näiden piilotettujen palvelujen sijainnin paljastaminen, toisin sanoen deanonymisointi, on ollut tietoturvatutkimuksen kohte...

Full description

Bibliographic Details
Main Author: Turunen, Olli
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Format: Bachelor's thesis
Language:fin
Published: 2020
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/68897
_version_ 1826225800081309696
author Turunen, Olli
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Turunen, Olli Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Turunen, Olli Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Turunen, Olli
datasource_str_mv jyx
description Tor-verkon avulla on mahdollista ylläpitää sijainniltaan suojattuja piilotettuja palveluita, joita käytetään laillisten tarkoitusperien lisäksi myös rikollisiin tarkoituksiin. Näiden piilotettujen palvelujen sijainnin paljastaminen, toisin sanoen deanonymisointi, on ollut tietoturvatutkimuksen kohteena varsin laajasti. Deanonymisointia varten on esitetty useita menetelmiä sekä Tor-verkon uhkamallin sisä- että ulkopuolelta. Tor-verkon arkkitehtuurin paraneminen ja verkon laajeneminen tekee deanonymisoinnista vaativaa. Varsinkaan uhkamallin ulkopuolisia menetelmiä vastaan ei kuitenkaan suorituskykysyistä ole vielä laajasti otettu käyttöön tehokkaita vastatoimia. Tor network enables maintaining of location hidden services, that are used both for legit and illicit purposes. Revealing the locations of these hidden sercvices, also called deanonymization, has inspired major security research. Different methods of deanonymization have been proposed both within and outside of Tor threat model. Improving architechture and expansion of Tor network makes deanonymization a demanding task. However, considering especially the methods from outside of the threat model, efficient countermeasures have not yet been taken into significant use due to performance reasons.
first_indexed 2020-05-08T20:00:31Z
format Kandityö
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Saksa, Tytti", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Turunen, Olli", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2020-05-08T05:17:31Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2020-05-08T05:17:31Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2020", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/68897", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Tor-verkon avulla on mahdollista yll\u00e4pit\u00e4\u00e4 sijainniltaan suojattuja piilotettuja palveluita, joita k\u00e4ytet\u00e4\u00e4n laillisten tarkoitusperien lis\u00e4ksi my\u00f6s rikollisiin tarkoituksiin. N\u00e4iden piilotettujen palvelujen sijainnin paljastaminen, toisin sanoen deanonymisointi, on ollut tietoturvatutkimuksen kohteena varsin laajasti. Deanonymisointia varten on esitetty useita menetelmi\u00e4 sek\u00e4 Tor-verkon uhkamallin sis\u00e4- ett\u00e4 ulkopuolelta. Tor-verkon arkkitehtuurin paraneminen ja verkon laajeneminen tekee deanonymisoinnista vaativaa. Varsinkaan uhkamallin ulkopuolisia menetelmi\u00e4 vastaan ei kuitenkaan suorituskykysyist\u00e4 ole viel\u00e4 laajasti otettu k\u00e4ytt\u00f6\u00f6n tehokkaita vastatoimia.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Tor network enables maintaining of location hidden services, that are used both for legit and illicit purposes. Revealing the locations of these hidden sercvices, also called deanonymization, has inspired major security research. Different methods of deanonymization have been proposed both within and outside of Tor threat model. Improving architechture and expansion of Tor network makes deanonymization a demanding task. However, considering especially the methods from outside of the threat model, efficient countermeasures have not yet been taken into significant use due to performance reasons.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2020-05-08T05:17:31Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2020-05-08T05:17:31Z (GMT). No. of bitstreams: 0\n Previous issue date: 2020", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "28", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "piilotetut palvelut", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "deanonymisointi", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Tor-verkon piilotettujen palveluiden deanonymisointi", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202005083107", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "anonyymiverkot", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "Tor-verkko", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_68897
language fin
last_indexed 2025-02-18T10:55:30Z
main_date 2020-01-01T00:00:00Z
main_date_str 2020
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/89c02830-0382-442e-8c14-6755cbfe3a4c\/download","text":"URN:NBN:fi:jyu-202005083107.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2020
record_format qdc
source_str_mv jyx
spellingShingle Turunen, Olli Tor-verkon piilotettujen palveluiden deanonymisointi piilotetut palvelut deanonymisointi Tietotekniikka Mathematical Information Technology 602 anonyymiverkot Tor-verkko
title Tor-verkon piilotettujen palveluiden deanonymisointi
title_full Tor-verkon piilotettujen palveluiden deanonymisointi
title_fullStr Tor-verkon piilotettujen palveluiden deanonymisointi Tor-verkon piilotettujen palveluiden deanonymisointi
title_full_unstemmed Tor-verkon piilotettujen palveluiden deanonymisointi Tor-verkon piilotettujen palveluiden deanonymisointi
title_short Tor-verkon piilotettujen palveluiden deanonymisointi
title_sort tor verkon piilotettujen palveluiden deanonymisointi
title_txtP Tor-verkon piilotettujen palveluiden deanonymisointi
topic piilotetut palvelut deanonymisointi Tietotekniikka Mathematical Information Technology 602 anonyymiverkot Tor-verkko
topic_facet 602 Mathematical Information Technology Tietotekniikka Tor-verkko anonyymiverkot deanonymisointi piilotetut palvelut
url https://jyx.jyu.fi/handle/123456789/68897 http://www.urn.fi/URN:NBN:fi:jyu-202005083107
work_keys_str_mv AT turunenolli torverkonpiilotettujenpalveluidendeanonymisointi