Research Field


I have are lot of interests in doing research in the Network Technology field, mainly development and implementation based on the newly invented methodology and approaches.
In addition, I have the desire to go knee deep in Technology when doing random researches including programming, Linux network configurations, network security, general high technology, reviews and many more.....

Research focuses on:
 
Scalable Routing Overlay Networks
  •   Implemented mesh construction services


The Tor Network

    Click image to enlarge
    The Tor Network Topology
    The Tor network is widely used nowadays to protect users' online activities. The Internet are widely used which, enables easy access to information almost from anywhere including very remote places, and such provides great convenience. However, the security and privacy of users have become a concern. One of the major concerns is that the network infrastructure has become a target for adversaries. That is, if the adversaries successfully take control of the internet communication network, they can deprive the users' privacy rights by viewing or stealing their confidential information. As a result, security and privacy network technologies such as Tor network have become useful and important for users' security purposes. 
    Tor builds anonymous connections within are onion routers (relay nodes). The onion routers accept a number of fixed-length messages from different sources, perform cryptographic transformation on the messages, and then forward the messages to the next destination in an order not predictable from the order of inputs. The Tor network system focuses on security and privacy network for users as it provides secure private communication, as well as allowing the users to perform online activities anonymously through public internet network.


    Tor and SSH Tunnels - Privacy on the Internet

    In the past, all computers on the Computer Science Department network had public IP addresses. This means they were accessible from anywhere in the world. This was convenient for those working at home because they could directly connect to the computers in their offices and research labs.

    Public IP addresses also caused problems. Because these computers were universally accessible, they could be attacked by anyone on the global Internet. They could also become infected by a virus or a worm and spread the infection to others.

    SSH (secure shell) is normally used to allow secure encrypted command line connections to a server. It can also be used to create encrypted network tunnels to transport unencrypted data, such as email sessions. SSH tunnels aren't just for email only. They can be used to transport just about any sort of traffic. Hack-A-Day has a guide for sending all of your web traffic through a tunnel using PuTTY for Windows. We can keep the SSH and email services on the same box, but also remotely redirect traffic to another machine if email and SSH are on separate servers.

    OpenSSH is a great means to protect your connection from being sniffed by others. However, this isn't always enough. Simply proving that you connected to a server is enough to get incriminated. Unfortunately, SSH doesn't provide a native way to obfuscate to whom it connects. Instead, a proxy server can be set up. And this is where TOR comes to play to improve and securely protected the users through created virtual circuits when accessing Internet anonymously.