-
Anonymity Network Tor and Performance Analysis of ARANEA; an IOT Based Privacy-Preserving Router
Authors:
AKM Bahalul Haque,
Sharaban Tahura Nisa,
Md. Amdadul Bari,
Ayvee Nusreen Anika
Abstract:
There was a time when the word security was only confined to the physical protection of things that were valuable which must be guarded against all the odds. Today, in a world where people can do things virtually have emerged the necessity to protect the virtual world. Every single facet of our life is being controlled by the internet one way or another. There is no privacy in the cyberspace as th…
▽ More
There was a time when the word security was only confined to the physical protection of things that were valuable which must be guarded against all the odds. Today, in a world where people can do things virtually have emerged the necessity to protect the virtual world. Every single facet of our life is being controlled by the internet one way or another. There is no privacy in the cyberspace as the data which we are browsing on the internet is being monitored on the other side by someone. Each work we are doing on the internet is getting tracked or the data are getting leaked without consent. To browse the internet securely we developed a router named Aranea which relates to the browser Tor. Tor gives traffic anonymity and security. The Tor browser can be used in both positive and negative purpose. Tor encrypts data, it hides the location and identity of the user, it hides the IP address of the device, it hides the network traffic and many more. By using Tor browser each user can browse the internet safely in the cyber world. Our goal is to create an additional security bridge through the router Aranea for every user so that each user can simply browse the internet anonymously.
△ Less
Submitted 4 June, 2019;
originally announced June 2019.
-
XDoser, A Benchmarking Tool for System Load Measurement Using Denial of Service Features
Authors:
AKM Bahalul Haque,
Rabeya Sultana,
Mohammad Sajid Fahad,
MD Nasif Latif,
Md. Amdadul Bari
Abstract:
Technology has developed so fast that we feel both safe as well as unsafe in both ways. Systems used today are always prone to attack by malicious users. In most cases, services are hindered because these systems cannot handle the amount of over loads the attacker provides. So, proper service load measurement is necessary. The tool that is being described in this paper for developments is based on…
▽ More
Technology has developed so fast that we feel both safe as well as unsafe in both ways. Systems used today are always prone to attack by malicious users. In most cases, services are hindered because these systems cannot handle the amount of over loads the attacker provides. So, proper service load measurement is necessary. The tool that is being described in this paper for developments is based on the Denial of Service methodologies. This tool, XDoser will put a synthetic load on the servers for testing purpose. The HTTP Flood method is used which includes an HTTP POST method as it forces the website to gather the maximum resources possible in response to every single request. The tool developed in this paper will focus on overloading the backend with multiple requests. So, the tool can be implemented for servers new or old for synthetic test endurance testing.
△ Less
Submitted 30 May, 2019;
originally announced May 2019.
-
A Secure Communication Scheme for Corporate and Defense Community
Authors:
Akm. B. Haque,
Md. A. Bari,
S. S. Arman,
FT. Progga
Abstract:
Security is one of the major concerns of modern communication systems. Users demand a secure communication environment that provides privacy to the people while they are sharing messages to anyone. Privacy is a prime concern nowadays. This paper aims to provide an optimal platform for communication between the sender and the receiver. This prototype designed in the paper will provide a better anon…
▽ More
Security is one of the major concerns of modern communication systems. Users demand a secure communication environment that provides privacy to the people while they are sharing messages to anyone. Privacy is a prime concern nowadays. This paper aims to provide an optimal platform for communication between the sender and the receiver. This prototype designed in the paper will provide a better anonymous path for routing messages. It will ensure ones full privacy while he or she is using this system for communication. As the proposed system provides a secure communication environment, it is supposed to be useful for the secret communication inside different governmental and non-governmental organizations. The law enforcements can use this system for any of their operations as it will encrypt and decrypt the message to give a secure platform for communication.
△ Less
Submitted 6 March, 2019;
originally announced March 2019.