Wednesday, April 20, 2011

Kinkaku-ji temple in kyoto, Japan.
Timothy Girry. Kale

Hello and Welcome to my personal research blog website. 

I hope you enjoy surfing through this site and know some of the information about my research studies, and my experiences in the field of Information Communication Technology (ICT) & Network Security.

My name is Timothy Girry Kale and I originated in the Solomon Islands. I got my PhD in Engineering, specifically in the fields of ICT, Information Network Systems, and Software Engineering. I did my research at the University of Electro-Communication in Tokyo, Japan. My main research interests are in the areas of security and privacy, multimedia control, software development, computer network, and Internet overlay network. I always have dreamed to develop and implement useful strategies for security in the overlay network to protect Internet transactions, since many issues concerning security and privacy are uprising nowadays in Internet communications

Some of my past research studies focused on investigating the SSH interactive traffic through Tor assigned flags relays. The common approach in the past is all computers usually accessed via public IP addresses. This means they were accessible from anywhere in the world. This was convenient for those working at home because they could directly connect to the computers in their offices and research labs. 
However, Public IP addresses also caused problems. Because these computers were universally accessible, they could be attacked by anyone on the global Internet. They could also become infected by a virus or a worm and spread the infection to others. 
OpenSSH is a great means to protect your connection from being sniffed by others. However, this isn't always enough. Simply proving that you connected to a server is enough to get incriminated. Unfortunately, SSH doesn't provide a native way to obfuscate to whom it connects. Instead, a proxy server can be set up. And this is where TOR comes to play to improve and securely protected the users through created virtual circuits when accessing Internet anonymously.

I graduated with a Master's degree in implementing the strategies to overcome the TCP (Transfer Control Protocol) throughput degradation in Tor communication network, by employing the techniques of performance flags, which are assigned to all Tor relays by the Tor directory servers. These performance flags have some properties in common, stability, longer active run time, and high bandwidth. The primary goal is to overcome the TCP throughput degradation, which occurs along the Tor circuit path length, based on each TCP segment between the onion routers within Tor mixed network. This research can be applied to all related overlay networks.

In my undergraduate thesis, I develop a new customer interactive system using a net-bean application system development.

For more information, please visit some of the top links above.


Here are some of my views on Network Security.

  • Network Security and Privacy Technologies
 
Thank you very much









 ------------------------------------------------------------@@@@@-------------------------------------------------------
Please be advice that some of the important links will prompt you to enter your "ID" or "Not Found" for security and privacy reasons. If you are interested to view those links, please send request message to my contact email above, and you will be granted permission to access and download specific content you want. Thank you very much for your understanding.

By Administrator
---------------------------------------------@@@@@@@@@@@@@@@-------------------------------------------