40 research outputs found

    Layer Two Tunneling Protocol "L2TP"

    Full text link

    Web Tracking: Mechanisms, Implications, and Defenses

    Get PDF
    This articles surveys the existing literature on the methods currently used by web services to track the user online as well as their purposes, implications, and possible user's defenses. A significant majority of reviewed articles and web resources are from years 2012-2014. Privacy seems to be the Achilles' heel of today's web. Web services make continuous efforts to obtain as much information as they can about the things we search, the sites we visit, the people with who we contact, and the products we buy. Tracking is usually performed for commercial purposes. We present 5 main groups of methods used for user tracking, which are based on sessions, client storage, client cache, fingerprinting, or yet other approaches. A special focus is placed on mechanisms that use web caches, operational caches, and fingerprinting, as they are usually very rich in terms of using various creative methodologies. We also show how the users can be identified on the web and associated with their real names, e-mail addresses, phone numbers, or even street addresses. We show why tracking is being used and its possible implications for the users (price discrimination, assessing financial credibility, determining insurance coverage, government surveillance, and identity theft). For each of the tracking methods, we present possible defenses. Apart from describing the methods and tools used for keeping the personal data away from being tracked, we also present several tools that were used for research purposes - their main goal is to discover how and by which entity the users are being tracked on their desktop computers or smartphones, provide this information to the users, and visualize it in an accessible and easy to follow way. Finally, we present the currently proposed future approaches to track the user and show that they can potentially pose significant threats to the users' privacy.Comment: 29 pages, 212 reference

    Managing Access Control in Virtual Private Networks

    Get PDF
    Virtual Private Network technology allows remote network users to benefit from resources on a private network as if their host machines actually resided on the network. However, each resource on a network may also have its own access control policies, which may be completely unrelated to network access. Thus users� access to a network (even by VPN technology) does not guarantee their access to the sought resources. With the introduction of more complicated access privileges, such as delegated access, it is conceivable for a scenario to arise where a user can access a network remotely (because of direct permissions from the network administrator or by delegated permission) but cannot access any resources on the network. There is, therefore, a need for a network access control mechanism that understands the privileges of each remote network user on one hand, and the access control policies of various network resources on the other hand, and so can aid a remote user in accessing these resources based on the user\u27s privileges. This research presents a software solution in the form of a centralized access control framework called an Access Control Service (ACS), that can grant remote users network presence and simultaneously aid them in accessing various network resources with varying access control policies. At the same time, the ACS provides a centralized framework for administrators to manage access to their resources. The ACS achieves these objectives using VPN technology, network address translation and by proxying various authentication protocols on behalf of remote users

    A survey on web tracking: mechanisms, implications, and defenses

    Get PDF
    Privacy seems to be the Achilles' heel of today's web. Most web services make continuous efforts to track their users and to obtain as much personal information as they can from the things they search, the sites they visit, the people they contact, and the products they buy. This information is mostly used for commercial purposes, which go far beyond targeted advertising. Although many users are already aware of the privacy risks involved in the use of internet services, the particular methods and technologies used for tracking them are much less known. In this survey, we review the existing literature on the methods used by web services to track the users online as well as their purposes, implications, and possible user's defenses. We present five main groups of methods used for user tracking, which are based on sessions, client storage, client cache, fingerprinting, and other approaches. A special focus is placed on mechanisms that use web caches, operational caches, and fingerprinting, as they are usually very rich in terms of using various creative methodologies. We also show how the users can be identified on the web and associated with their real names, e-mail addresses, phone numbers, or even street addresses. We show why tracking is being used and its possible implications for the users. For each of the tracking methods, we present possible defenses. Some of them are specific to a particular tracking approach, while others are more universal (block more than one threat). Finally, we present the future trends in user tracking and show that they can potentially pose significant threats to the users' privacy.Peer ReviewedPostprint (author's final draft

    Softwire Security Analysis and Requirements

    Full text link

    IRMAGUARD

    Get PDF

    Розробка та реалізація мережних протоколів. Навчальний посібник

    Get PDF
    Розробка та реалізація мережних протоколів важлива частина сучасної галузі знань, що необхідна для актуального забезпечення взаємозв’язку рівнів та різних технологій будь-якої локальної і глобальної мереж. Мережеві протоколи базуються на міжнародних стандартах, що забезпечують якісну взаємодію різних інноваційних технологій та різних елементів мережі. Вони складають семирівневу структуру, яка здійснює забезпечення вирішення інженерно-технічних питань та потребує постійно оновлювати, вдосконалювати та розробки нових протоколів, як правила взаємодії всіх складових глобальної мережі. Розробка та реалізація мережних протоколів потребує постійного розвитку та вдосконалення для надання абонентам високонадійних видів послуг з високошвидкісною передачею даних.The development and implementation of network protocols is an important part of the modern field of knowledge that is necessary for the actual interconnection of levels and different technologies of any local and global networks. Network protocols are based on international standards that ensure high-quality interaction of various innovative technologies and various network elements. They form a seven-tier structure that provides solutions to engineering and technical issues and requires constant updating, improvement and development of new protocols, as rules of interaction of all components of the global network. The development and implementation of network protocols requires constant development and improvement to provide subscribers with highly reliable types of services with high-speed data transmission.Разработка и реализация сетевых протоколов важная часть современной отрасли знаний, которая необходима для актуального обеспечения взаимосвязи уровней и различных технологий любой локальной и глобальной сетей. Сетевые протоколы базируются на международных стандартах, обеспечивающих качественное взаимодействие различных инновационных технологий и различных элементов сети. Они составляют семиступенчатая структуру, которая осуществляет обеспечение решения инженерно-технических вопросов и требует постоянно обновлять, совершенствовать и разрабатывать новые протоколы, как правила взаимодействия всех составляющих глобальной сети. Разработка и реализация сетевых протоколов требует постоянного развития и совершенствования для предоставления абонентам высоконадежных видов услуг по высокоскоростной передачей данных

    Telemedicine system in the South Atlantic. Phase VII (I)

    Get PDF
    The information technology and communications (also known as ICT) are an essential part of the evolution in the economy and society. Access to information has become a vital tool for the development of a community. Consequently, there has been a phenomenon known as "digital divide", which refers to differences between countries that have access to ICT and those without. This project aims to provide a small gesture to reduce the gap between what is often called "differences between North and South", providing an improvement in the telemedicine system that the NGO Telecos Sense Fronteres is developing to the Region of South Atlantic of Nicaragua since 2006. This seventh stage of the project has tried, first of all, to make a careful maintenance of the infrastructure and equipment which currently has the Hospital Ernesto Sequeira Blanco of Bluefields; to improve their performance by incorporating a system of virtual desktops. In addition, the VoIP telephony system has been expanded to other departments of the hospital and other health centres of Bluefields, plus designing a virtual private network for their internal use. Secondly, there has been worked in a radio-link to bring telemedicine to Monkey Point, a rural community, isolated and without access to telecommunications. Finally, it has been emphasized the fact to bring the project to the community of Bluefields in order that they appropriate it and not see it as mere spectators. Related to this, some collaboration agreements have been closed with various local institutions that can contribute to self-management of the project, such as Bluefields Indian & Caribbean University (with engineering students) or the Sistema Local de Atención Integral en Salud (both with the economic and health sides).Català: Les tecnologies de la informació i les comunicacions (també anomenades TIC) són una part essencial dels canvis en l'economia i la societat actual. L'accés a la informació s'ha convertit en una eina vital pel desenvolupament d'una comunitat. Arran d'això, ha sorgit un fenomen conegut com a “bretxa digital”, el qual fa referència a les diferències entre països que tenen accés a les TIC, i aquells que no. Aquest projecte pretén aportar un petit gest per tal de disminuir aquesta bretxa entre el que freqüentment s'anomena “diferències entre Nord i Sud”, proporcionant una millora en el Sistema de Telemedicina que la ONG Telecos Sense Fronteres està desenvolupant a la Regió de l'Atlàntic Sur de Nicaragua des del 2006. En aquesta setena fase del projecte, s'ha pretés, en primer lloc, fer un manteniment acurat de la infraestructura i els equips dels quals disposa l'Hospital Ernesto Sequeira Blanco de Bluefields, millorat-ne les prestacions amb la incorporació d'un sistema d'escriptoris virtuals. A més, s'ha ampliat la xarxa de telefonia VoIP per tal de fer-la extensiva a altres departaments de l'hospital i a altres centres de salut de la població, concretant una xarxa privada virtual pel seu ús intern. En segon terme, s'ha treballat en un radioenllaç per fer arribar la telemedicina a Monkey Point, una comunitat rural, aïllada i sense accés a les telecomunicacions. Finalment, s'ha fet èmfasi en apropar el projecte a la pròpia comunitat de Bluefields amb la finalitat que se l'apropiïn i no el vegin com a mers espectadors. En aquesta direcció, s'han establert convenis de col·laboració amb diferents entitats que poden contribuir a l'autogestió del projecte, com són la Bluefields Indian & Caribbean University (amb estudiants d'enginyeria) o el Sistema Local de Atención Integral en Salud (amb la part econòmica i relacionada amb la salut)

    User Privacy Leakage in Location-based Mobile Ad Services

    Get PDF
    The online advertising ecosystem leverages its massive data collection capability to learn the properties of users for targeted ad deliveries. Many Android app developers include ad libraries in their apps as a way of monetization. These ad libraries contain advertisements from the sell-side platforms, which collect an extensive set of sensitive information to provide more relevant advertisements for their customers. Existing efforts have investigated the increasingly pervasive private data collection of mobile ad networks over time. However, there lacks a measurement study to evaluate the scale of privacy leakage of ad networks across different geographical areas. In this work, we present a measurement study of the potential privacy leakage in mobile advertising services conducted across different locations. We develop an automated measurement system to intercept mobile traffic at different locations and perform data analysis to pinpoint data collection behaviors of ad networks at both the app-level and organization-level. With 1,100 popular apps running across 10 different locations, we perform extensive threat assessments for different ad networks. Meanwhile, we explore the ad-blockers’ behavior in the ecosystem of ad networks, and whether those ad-blockers are actually capturing the users’ private data in the meantime of blocking the ads. We find that: the number of location-based ads tends to be positively related to the population density of locations, ad networks collect different types of data across different locations, and ad-blockers can block the private data leakage
    corecore