Download Presentation_Oral_qualifying_exam_Elgzil_AbdelhamidV3

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Computer security wikipedia , lookup

Airborne Networking wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Net bias wikipedia , lookup

Deep packet inspection wikipedia , lookup

List of wireless community networks by region wikipedia , lookup

Transcript
Privacy Through Anonymous
Connection and Browsing
By: Abdelhamid Elgzil
Advisor: Dr. Chow
Outline
•
•
•
•
•
•
•
•
Introduction
The problem
The issue of Privacy and anonymity
TOR: The Onion Router Network
AirVpn: Virtual Private Network
CHALLENGES AND CONTROVERSY
Conclusion
Potential Research and Future Work
Introduction
• Privacy and Anonymity are becoming a big
concern for individuals and organizations
• Examine two technologies:
– The Onion Router (TOR) project for anonymous
and security browsing
– Virtual Private Network (VPN) to maintain privacy
The Problem
• Concern about improving privacy and security on the
Internet
• Protecting against traffic analysis
• source and destination information can lead to track the
user behavior and interests, even connection is encrypted
• Looking for new communication tools
– Built-in privacy features
– Help share information over public networks without
compromising user’s privacy
– Get connected to news sites, using instant messaging services,
or avoid geo-blacking
– Helps publish web sites and other services without exposing the
location of the site
– Supporting socially sensitive communication
The problem
•
•
•
•
Additional layer of protection
VPN gain tightened anonymity protection
Hiding using of TOR
Enable TOR use in geo-blocked regions
Privacy and anonymity
• Two different thoughts
• Both progressively essential as we get
increasingly monitored and pursued
• Privacy  Ability to keep some things to yourself
– Regardless of their impact to society
• Anonymity  Corner stone of the Internet
culture
• Anonymity extremely effective in promoting
freedom of expression
Privacy and anonymity
• The degree of privacy mostly linked to:
– Type of encryption utilized
– Computational capacity avail- able
• In some circumstances, threats against privacy
and anonymity happen due to the absence of
proper technology  unintentionally
– Bugs, ISP
– Non-educated users
TOR: THE ONION ROUTER NETWORK
TOR: Architecture
How TOR Works
How TOR Works
How TOR Works
VPN: AirVpn Servers
VPN: AirVpn Server Locations
CHALLENGES AND CONTROVERSY
• Criminals could take advantage
• Anonymizers aren’t foolproof
– First and last routers are malicious or compromised
• OSP publish enough information about their
workings, including node addresses
– Governments or other organizations block traffic
• Some single-proxy anonymizer services may log
users’ IP addresses
CHALLENGES AND CONTROVERSY
• Providing greater security VS. Performance
– Additional proxies and encryption increase overhead
– Performance overhead causes anonymization to slow
users’ Internet access
• ISPs block nodes to control spam
– They block those used by anonymizers
• Browser complexity and the need to maintain
browsing functionality could help proficient
hackers sidestep anonymization
CHALLENGES AND CONTROVERSY
• Cultural and legal challenges
– Legal challenge Some countries outlawing or could
decide to prohibit the use of privacy tool
– They require all Internet providers to keep detailed
access records
– The cultural issue The trend toward [openness on
the Internet]
• The desire to privacy and Anonymous
communication will drive the technology’s
continued development and adoption
Conclusion
• Privacy and security are interconnected
• Almost impossible to achieve one without the other
• People and organizations need to have some level of
anonymity
• Anonymity can be abused by some people, but should
not be an excuse
• Privacy and anonymity are important in today’s
information technology driven world
• Today, users aware of privacy and anonymity impacts
– This will have positive economic outcomes
Potential Research and Future Work
• Create TOR Emulator by leveraging Softwaredefined networking (SDN)
• Enhance packet marking techniques to efficiently
trace the packet path within TOR network
• How to utilize SDN controller in cloud to detect
the using of VM as a TOR relay, by analyzing the
characteristics of TOR relay in virtualized
envirment
• Using TOR bridges or TOR proxy to hide the
intention to connect to TOR (prevent others to
detect your using of TOR)
Questions?