DOI QR코드

DOI QR Code

Network Security Practices through Anonymity

  • Smitha, G R (Department of Information Science Engineering R.V College of Engineering) ;
  • Suprith C Shekar (Department of Mechanical Engineering R.V College of Engineering) ;
  • Ujwal Mirji (Department of Mechanical Engineering R.V College of Engineering)
  • Received : 2024.04.05
  • Published : 2024.04.30

Abstract

Anonymity online has been an ever so fundamental topic among journalists, experts, cybersecurity professionals, corporate whistleblowers. Highest degree of anonymity online can be obtained by mimicking a normal everyday user of the internet. Without raising any flags of suspicion and perfectly merging with the masses of public users. Online Security is a very diverse topic, with new exploits, malwares, ransomwares, zero-day attacks, breaches occurring every day, staying updated with the latest security measures against them is quite expensive and resource intensive. Network security through anonymity focuses on being unidentifiable by disguising or blending into the public to become invisible to the targeted attacks. By following strict digital discipline, we can avoid all the malicious attacks as a whole. In this paper we have demonstrated a proof of concept and feasibility of securing yourself on a network by being anonymous.

Keywords

References

  1. Tarek S. Sobh, Yasser Aly, "Effective and Extensive Virtual Private Network," Journal of Information Security, 2011, 2, pp. 39-49 https://doi.org/10.4236/jis.2011.21004
  2. Dawson, Maurice & Cardenas-Haro, Jose , "Tails Linux Operating System: Remaining Anonymous with the Assistance of an Incognito System in Times of High Surveillance. International Journal of Hyperconnectivity and the Internet of Things," pp. 47-55, IJHIoT.2017010104, 2017
  3. Rutkowska, Joanna. "Qubes OS Architecture," 2010
  4. Sinha Sanjib,"Proxy Chains," 2017
  5. Sungmo Jung, Jong Hyun Kim and Seoksoo Kim, "A Study on MAC Address Spoofing Attack Detection Structure in Wireless Sensor Network Environment," ACN 2011, CCIS 199, pp. 31-35, 2011
  6. Alotaibi, Bandar; Elleithy, Khaled. 2016. "A New MAC Address Spoofing Detection Technique Based on Random Forests" Sensors 16, no. 3: 281.
  7. M. Anathi, K. Vijayakumar, "An intelligent approach for dynamic network traffic restriction using MAC address verification" Computer Communications, Volume 154, 2020, Pages 559-564, ISSN 0140-3664 https://doi.org/10.1016/j.comcom.2020.02.021
  8. Henry Chukwuemeka Paul and Kinn Abass Bakon, "A STUDY ON IPv4 and IPv6: THE IMPORTANCE OF THEIR CO-EXISTENCE," IJISE, Vol. 4 (No.2), November, 2016
  9. Sanjay, Balaji Rajandran and Pushparaj Shetty, "Domain Name System (DNS) Security: Attaacks Identification and Protection Methods," Int'l Conf. Security and Management , SAM'18, pp. 27-33
  10. Robert Wahlstedt and Dr. Mercer, "Towards a Secure Deployment of DNS," unpublished, December 11, 2019
  11. Mathy Vanhoef, Celestin Matte, Mathieu Cunche, Leonardo S. Cardoso and Frank Piessens,"Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms," AISA CSS '16, pp. 413-424
  12. Jung, Jaeyeon & Sit, Emil & Balakrishnan, Hari & Morris, Robert, "DNS Performance and the Effectiveness of Caching. ACM SIGCOMM Computer Communication Review," 2002
  13. Labrador, Jeyran & Cruz, Michael & Dinawanao, Dante ,"DNSFilter: An Erlang/OTP Implementation of a DNS-Based Web Filtering System," 2013
  14. S. J. Murdoch and G. Danezis, "Low-cost traffic analysis of Tor," 2005 IEEE Symposium on Security and Privacy (S&P'05), Oakland, CA, USA, 2005, pp. 183-195
  15. Renata Mekovec, "Onilne Privacy: Overview and Preliminary Research," JIOS, Vol. 34, No. 2, 2010
  16. Nora McDonald, Benjamin Mako Hill, Rachel Greenstadt and Andrea Forte, "Privacy, Anonymity, and Perceived Risk in Open Collaboration: A Study of Service Providers" CHI 2019
  17. Balazs Bodo, "Hacktivism 1-2-3: how privacy enhancing technologies change the face of anonymous hacktivism," INTERNET POLICY REVIEW Journal on internet regulation, Vol. 4, Issue 3