Home » Author Archives: Tamer Sameeh

Author Archives: Tamer Sameeh

The SSH Public Key Authentication Protocol Over Tor – How Vulnerable It Is to Timing Attacks?

The Secure Shell (SSH) public key authentication protocol represents one of the most popularly used authentication methods that rely on public key cryptography. Apart from its massive popularity, the SSH protocol hasn’t been massively studied and even the most advanced users often misconceive its functionality. Version 2 of the SSH protocol is presently being used by millions of internet connected ... Read More »

Tor Fingerprinting – Is the Tor Browser Immune Against Browser Fingerprinting?

On October 4, 2013, the Guardian published a report which stated that Edward Snowden, a former CIA employee and whistleblower, sent the British newspaper classified documents that proved that the National Security Agency (NSA) had been repeatedly making attempts to formulate successful attacks against Tor, or the onion router. However, the report claimed that all of NSA’s attempts failed to ... Read More »

TorPolice – A Novel Framework For Enforcing Access Control Policies Across the Tor Network

The Tor network represents the most popular anonymity network, which is currently used by millions of users all over the world. Nevertheless, access control doesn’t exist for users of the Tor network, which renders the network susceptible to malicious attacks and botnet abuse. For instance, adversaries often exploit exit relay nodes utilizing them as stepping stones for various forms of ... Read More »

μProxy – A Hardware Relay Solution for Protecting Geolocation Anonymity of Internet Users

Anonymity and privacy of internet users have attracted considerable attention during the past few years. A pivotal privacy issue is that a user’s geographical location can be pinpointed, if his/her IP address has been detected, giving the attacker a relatively precise real-time location. In most cases, this information is adequate for an attacker, to close in and eventually determine the ... Read More »

An Overview of Modern Tor Deanonymization Attacks

Tor was designed to provide a decentralized, censorship resistant network that can offer internet users, websites and various web services anonymity via easy-to-implement means. Nevertheless, since the advent of Tor, some users have failed to maintain their anonymity. Throughout this article, we will discuss Tor’s deanonymization techniques that are available today. We will go through traffic and timing correlation attacks, ... Read More »

Tutorial – How To Host Your Own DNS Website Domain On Ethereum’s Blockchain

You can now host DNS domains on Ethereum’s blockchain through ENS, which is short for Ethereum Name Service, a distributed, extensible domain naming system that relies on Ethereum’s blockchain. This is possible via adjusting the domain name server settings to point to gateway DNS servers, which resolve lookups through checking an ENS registry that points to resolvers including the zone ... Read More »

port_scan_monitor_sc.gif

Examining Port Scan Attacks Via Data From Darknets

Port scanning is a preliminary approach that is most commonly used by hackers in order to determine vulnerable hosts that they can attack successfully. Scanning is a fully automated process that is utilized by hackers to detect machines, servers and peripherals that exist on a given network. A successful scan can yield details of machines discovered on the scanned network ... Read More »

A Novel Hybrid Web Crawler For Searching Both The Surface and Deep Web

  The spread of terrorism over the globe has led to an increase in the efforts of law enforcement agencies (LEAs) along the rough path of discovering information related to terrorist activities via taking advantage of the most recent innovations in the web search sector. Their efforts have been centered upon the “surface web” which represents parts of the internet ... Read More »

Targeting Adversaries & Deanonymization Attacks Against Tor Users

  Tor is a P2P network for promoting traffic security of various forms of internet communications for millions of users worldwide. In most cases, Tor users are very unlikely to become the target of an adversary, as they are namely shielded via Tor against opportunistic local hackers, local censorship authorities and hostile destinations. Deanonymizing adversaries act through attempting to attack ... Read More »

The Deep Web, Novel Psychoactive Substances (NPS) and Psychonauts

Generally speaking, the internet and social media are growing in popularity at considerably rapid rates and presently play a pivotal role in the sale, distribution and marketing of “quasi” legal drugs. The quasi-anarchic nature of online marketplaces is gradually imposing a myriad of changes in illegal drug scenarios, changing the drug market to a virtual rather than a street perspective, ... Read More »

Geographical Analysis of Drug Trafficking On a Popular Darknet Marketplace

  Cryptomarkets are novel forms of online marketplaces, hosted on darknets, that simplify the trading of a myriad of illegal and illicit merchandize, namely drugs. Even though most relevant academic research studies focus on illegal drugs, a wide variety of other products and goods that are related to identity, or financial fraud, counterfeit goods or replicas, in addition to doping ... Read More »

UnitecDEAMP -A Novel Darknet Traffic Decomposition Approach

Malware is increasingly becoming major threats that almost always finds a way to penetrate through a network, undermining the integrity, confidentiality and availability of data. Network forensics represent the utilization of scientifically proven strategies to identify, obtain, fuse, examine and analyze digital evidence of pre planned intent, or monitored success of malicious activities meant to corrupt, disrupt and/or compromise various ... Read More »

A New Blockchain Market Engineering Approach – A Research Paper

Market engineering refers to the process of prudently restructuring a market aiming at transforming it into efficient and effective means for execution of exchange transactions. Via presenting a holistic, interdisciplinary set of tools to systematically analyze, design, structure and build the elements of various market platforms, to determine fields of application and also to formulate theoretical design and develop evaluation ... Read More »

Restricting Illegal Cryptocurrency Transactions Via An Ethereum Token

The trend of cryptocurrencies is flaring up like never before these days, as more individuals are tempted to use blockchain based, decentralized cryptocurrencies. Due to their decentralized peer-to-peer (P2P) nature, cryptocurrencies have won the hearts of decentralization advocates, crypto-anarchists and libertarians. Nevertheless, given the fact that cryptocurrencies cannot be controlled by any form of intermediary, or third party, they can ... Read More »

UVCoin – A New Cryptocurrency With Improved Scalability and Control Over Monetary Supply

Apart from their booming success, presently available cryptocurrencies suffer from multiple limitations. By far, the most demanding of these limitations is their poor scalability. The most used cryptocurrency network right now is bitcoin, which can handle no more than 7 transactions per second; this is significantly low when compared to Paypal which can handle over 100 transaction per second, and ... Read More »