Han Wu’s research while affiliated with Beijing University of Posts and Telecommunications and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (2)


Figure 2. Tor network simulation environment based on K8s. * represents the components of K8s, of which etcd is the database that stores the state of the entire cluster; apiserver provides the only entry point for users to operate resources; controller-manager is responsible for maintaining the state of the cluster; scheduler is responsible for scheduling Pods to the appropriate machines according to a predefined scheduling policy; kubelet is responsible for maintaining the container lifecycle, as well as Volume (CVI) and network (CNI) management.
Figure 4. Private Tor network organization process.
Figure 5. Circuit Association and Hidden Service Traceability Scenario Diagram.
Figure 6. Architectural Design of the Tor Network Simulation Method Based on Hybrid Networking of Multi-granularity Relays.
Table of the experimental environment.

+2

K8s-enhanced lightweight simulation method for the Tor network
  • Article
  • Full-text available

March 2025

·

29 Reads

Wentao Huang

·

Han Wu

·

Zeyu Li

·

[...]

·

Jinqiao Shi

Criminals exploit the robust anonymity afforded by Tor for illicit purposes, prompting heightened interest among researchers in de-anonymization attacks on the Tor network. The execution of experiments on de-anonymization attacks within a real Tor network presents considerable challenges, hence the necessity for a simulation environment. However, existing methods for simulating the Tor network are inadequate regarding realism, flexibility, and scalability, with some being prohibitively expensive. In this paper, we develop a lightweight and scalable Tor network simulation environment based on Kubernetes (K8s), employing Docker containers to simulate Tor relays. The results demonstrate that a network of up to a thousand Tor relays can be simulated using just four standard hosts. Furthermore, two de-anonymization attack experiments were conducted within this simulated environment, which exhibited high levels of realism and flexibility. Finally, a hybrid networking approach combining multi-granularity relays was explored to enhance further the balance between realism and cost in Tor network simulations.

Download