1 documents found
Information × Registration Number 0221U106453, 0121U111191 , R & D reports Title Research, analysis and modeling of modern security threats to information systems, technologies of counteraction to modern security systems using mechanisms of Internet access anonymization and malware traffic anti-analysis counteraction, code "Beresklet" popup.stage_title Head Novikov Oleksii M., Доктор технічних наук Registration Date 07-12-2021 Organization National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute" popup.description2 The report investigates common systems of internet anonymization based on Tor, i2p, VPN; protocols and means of masking the traffic of anonymization systems to counter systems DPI; malware models with integrated anonymization tools (which in particular use Tor, P2P technologies to control); models of the organization of the high-speed protected data transmission channel taking into account counteraction to deanonymization dogs; methods of deanonymization of the infrastructure of legal means management interception and remote control. Protocols obf4, meek, fteproxy, Dust, and methods of protection against active probing attacks (ScrambleSuit) are being analyzed. The use of these mechanisms can be useful for providing continuous anonymous access for communications on insecure channels in the conditions of active counteraction of network protection systems. Models of the MTProto / MTProxies protocols providing a high level are considered protection against deanonymization and filtering of traffic at the provider level. ZeroTier security model is studied and its ability to virtualize secure connections within a single global network. V2Ray project algorithms are analyzed. Models of malware and applications for protection of mobile communications (in particular, AnXray) are considered. The researched means of rapid deployment of VPN in the cloud (AlgoVPN) can be used as a basis for remote network anonymization network management system access. Software models for channel protection based on TLS and NaCl have been developed. Methods for identifying intrusion control infrastructure nodes used in targeted attacks at the national level are considered. It is shown that the presence of common signatures when generating SSL / TLS certificates can lead to deanonymization of the infrastructure at the level of analysis of the full IPv4 range, including long-term historical data. Features of implementation of the protocol of proxy of servers, generation of IPID can be used to reco Product Description popup.authors Ilin Kostiantyn I. Ilin Mykola I. Voitsekhovskyi Andrii V. Kostiukovets Ostap Yu. Mazurenko Oksana A. Moroz Dmytro V. Novikov Oleksii M YAKOBCHUK DMYTRO I popup.nrat_date 2021-12-07 Close
R & D report
Head: Novikov Oleksii M.. Research, analysis and modeling of modern security threats to information systems, technologies of counteraction to modern security systems using mechanisms of Internet access anonymization and malware traffic anti-analysis counteraction, code "Beresklet". (popup.stage: ). National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute". № 0221U106453
1 documents found

Updated: 2026-03-27