I have are lot of interests in doing research in the Network Technology field, mainly development and implementation based on the newly invented methodology and approaches.
In addition, I have the desire to go knee deep in Technology when doing random researches including programming, Linux network configurations, network security, general high technology, reviews and many more.....
Research focuses on:
Scalable Routing Overlay Networks
- Implemented mesh construction services
The Tor Network
The Tor Network Topology |
Tor builds anonymous connections within are onion routers (relay nodes). The onion routers accept a number of fixed-length messages from different sources, perform cryptographic transformation on the messages, and then forward the messages to the next destination in an order not predictable from the order of inputs. The Tor network system focuses on security and privacy network for users as it provides secure private communication, as well as allowing the users to perform online activities anonymously through public internet network.
- Related Papers:
- Improving efficiency and simplicity of Tor circuit establishment and hidden services
- Toward Improving Path Selection in Tor Network
- Improved Tor Performance with Multipath Routing
- Improve Security and Performance in the Tor network
- Locating Hidden Servers
- The Predecessor Attack An Analysis of a Threat
- Defending anonymous communication against passive logging attacks
- Install guide for Tor in ubuntu linux
- Libevent – an event notification library
- Tor download link
- Privoxy - Home Page
Tor and SSH Tunnels - Privacy on the Internet
In the past, all computers on the Computer Science Department network had public IP addresses. This means they were accessible from anywhere in the world. This was convenient for those working at home because they could directly connect to the computers in their offices and research labs.
Public IP addresses also caused problems. Because these computers were universally accessible, they could be attacked by anyone on the global Internet. They could also become infected by a virus or a worm and spread the infection to others.
SSH (secure shell) is normally used to allow secure encrypted command line connections to a server. It can also be used to create encrypted network tunnels to transport unencrypted data, such as email sessions. SSH tunnels aren't just for email only. They can be used to transport just about any sort of traffic. Hack-A-Day has a guide for sending all of your web traffic through a tunnel using PuTTY for Windows. We can keep the SSH and email services on the same box, but also remotely redirect traffic to another machine if email and SSH are on separate servers.
OpenSSH is a great means to protect your connection from being sniffed by others. However, this isn't always enough. Simply proving that you connected to a server is enough to get incriminated. Unfortunately, SSH doesn't provide a native way to obfuscate to whom it connects. Instead, a proxy server can be set up. And this is where TOR comes to play to improve and securely protected the users through created virtual circuits when accessing Internet anonymously.