SYSTEM OF A SELF-ORGANIZING VIRTUAL SECURE COMMUNICATION CHANNEL BASED ON STOCHASTIC MULTI-LAYER ENCRYPTION AND OVERLAY TECHNOLOGIES
Basinya E.A. Akhayeva Z.H.B. Zakirova A.B. Omarkhanova D.Z.H. Tolegenova G.B. Abduraimova B.K. Aldasheva L. Zhanayeva Z.H.A.
31 July 2022Little Lion Scientific
Journal of Theoretical and Applied Information Technology
2022#100Issue 164918 - 4927 pp.
The paper considers the problem of ensuring information security of information flows in computer networks operating on the basis of the TCP/IP protocol stack (Transmission Control Protocol/Internet Protocol). one of possible solutions for providing the data transfer protection, proposed in this paper is to use a combination approach to dynamically build encapsulated virtual network tunnels using onion and garlic routing, and additional encryption layers. The algorithm of tunnel self-organization based on the authors modification of the port knocking technology, taking into account metadata about the previous connection (route tracing, duration of interaction, the sequence of port enumeration, protocols and other control information, including the clients computing device) is described. An analysis of the conceptual vulnerabilities of TOR (The Onion Router) and I2P (invisible internet project) overlay networks is made, and possible approaches to their elimination are reviewed. The experiment in identification of unauthorized access to transit traffic on the output nodes of the TOR network is described. Under the experiment “traps” were used in the form of sending authentication data of own test servers through all active outgoing nodes in an open form, the redirection from top 100 _ foreign sites to other information resources (including falsification of DNS replies) was tracked . The duration of the experiment was two years. An analysis of the dynamics of the development of TOR network is further described, and the conclusions about the credibility of these networks are outlined. The results of the developed and software - implemented solution are described, as well as the results of testing. In conclusion, findings and recommendations on the use of the proposed system with various parameters are presented.
DPI , Encapsulation Of Virtual Tunnels , Garlic Traffic Routing , I2P , Multilayer Encryption , Network Attacks , Onion Traffic Routing , Overlay Networks , TOR , Traffic Analysers , Traffic Management , Virtual Secure Communication Channels
Text of the article Перейти на текст статьи
National Research Nuclear University MEPhI (Moscow Engineering Physics Institute), Moscow, Russian Federation
L.N.Gumilyov Eurasian National University, Department of Information Systems, Astana, Kazakhstan
Higher School of Information Technology and Engineering, Astana International University, Kazakhstan
S.Seifullin Kazakh Agro Technical University, Department of Information Systems, Astana, Kazakhstan
Astana IT University, Department of Information Systems, Astana, Kazakhstan
National Research Nuclear University MEPhI (Moscow Engineering Physics Institute)
L.N.Gumilyov Eurasian National University
Higher School of Information Technology and Engineering
S.Seifullin Kazakh Agro Technical University
Astana IT University
10 лет помогаем публиковать статьи Международный издатель
Книга Публикация научной статьи Волощук 2026 Book Publication of a scientific article 2026