Preview

Herald of the Kazakh-British Technical University

Advanced search

ANONIMIZATION AND DEANONIMIZATION. “CYBERTH” ON THE INTERNET

Abstract

In the 1990s, when the active development of the World Wide Web began, the popularity of anonymizers did not reach such a peak as it is today. The reason for the sharp increase in the demand for anonymity tools is the numerous scandals related to the violation of the privacy of personal user data: changing the privacy policy of Telegram messenger, according to which the company can now disclose the personal data of users suspected of terrorism to foreign government intelligence agencies; Facebook’s participation in Cambridge Analytica’s data collection for 50 million Americans; total surveillance of US intelligence services for information communications between citizens of many countries around the world, using existing information networks, disclosed by Edward Snowden. These and many other high-profile scandals about the violation of the privacy of users of the World Wide Web have led to the fact that they began to create various ways to anonymize the Internet. Today, Tor, VPN and proxy servers are considered the most popular representatives. There is a widespread belief that these methods are capable of ensuring the complete anonymity of the network user. But is it? Is it possible at all complete anonymity on the Internet? To answer these questions that are relevant today, you need to clearly understand what anonymization and de-anonymization are, as well as their division into species. In the case of anonymization, we consider the types of anonymizers, the algorithms of their work, as well as the pros and cons of each of them. When considering deanonimization, we will study its division into two categories, then we will focus on the most common methods of committing cyber-attacks.

About the Authors

A. I. Masalovich
OOO «Лавина Пульс»
Russian Federation


S. T. Amanzholova
Международный университет информационных технологий
Kazakhstan


E. L. Shevchenko
Международный университет информационных технологий
Kazakhstan


S. A. Samburskaya
Международный университет информационных технологий
Kazakhstan


References

1. https://https://clck.ru/

2. https://book.cyberyozh.com/ru/

3. https://packetstormsecurity.com/files/149351/Tor-Browser-SMB-Deanonymization-Information-Disclosure.html

4. https://habr.com/ru/post/237335/

5. https://habr.com

6. https://vkoshelek.com/

7. https://xakep.ru/2014/09/24/anonimuos-tips/


Review

For citations:


Masalovich A.I., Amanzholova S.T., Shevchenko E.L., Samburskaya S.A. ANONIMIZATION AND DEANONIMIZATION. “CYBERTH” ON THE INTERNET. Herald of the Kazakh-British Technical University. 2019;16(3):200-211. (In Russ.)

Views: 755


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1998-6688 (Print)
ISSN 2959-8109 (Online)