Systems, to observe the mobility and file-sharing usage of tens of millions of ![]() Internet user can leverage Skype, and potentially other real-time communication The identified user is participating in specific torrents. Identification field of the IP datagrams to verify with high accuracy whether We illustrate this threatīy combining Skype and BitTorrent to show that it is possible to determine theįile-sharing usage of identified users. The identified user is linked to his Internet usage. We also consider the linkability threat, in which We show how to scale the scheme to observe the mobility patterns of By calling the user periodically, we can then observe the mobility of Inconspicuously to find his IP address, which can be done even if he is behindĪ NAT. We first design a scheme that calls an identified targeted user We focus our study on Skype,Īlthough other real-time communication applications may have similar privacy In this paper, we show how to exploit real-time communication applications toĭetermine the IP address of a targeted user. ![]() Finally, we improve the protocol’s reliability by taking the blockchain as an immutable database to store the delivered messages. Moreover, we achieve a high level of anonymity by using the stealth address as the destination of the delivered message, which can only be identified by the intended receiver. This improvement reduces the time and computing resource costs by eliminating computationally heavy hash operations. To address this problem, we improve Bitmessage with a novel antispam mechanism based on proof-of-space, which requires the user to dedicate a certain amount of disk space to send a message. Unfortunately, Bitmessage uses proof-of-work as the solution to prevent spam, which wastes computational power and makes it inefficient to be used in practice. Bitmessage achieves anonymity and privacy by relying on the blockchain flooding propagation mechanism and asymmetric encryption algorithm. Bitmessage is a well-known decentralized messaging system that enables users to exchange messages and prevents accidental eavesdropping. There is potential to use blockchain in developing decentralized and transparent communication systems. Blockchain, with its characteristics of openness, decentralization, and tamper resistance, is an innovative technology underlying Bitcoin. As the most commonly used methods of communication, centralized systems cannot meet the increasing need for information security. We are in the Internet era, when protecting the security of personal information is both vital and challenging. It is shown that the proposed solution has the possibility of reducing the amount of spam traffic, while processing tens of thousands of simultaneous SMTP client requests in a distributed environment. Various performance tests are given: (1) The proposed system?s impact on client?s behaviour and the overall amount of spam messages, (2) The performance of the undistributed anti-spam SMTP server during spam attack, in terms of resource load analysis (3) Autoscaling demonstration and evaluation of proposed distributed system?s performance during a spam attack. The implemented system is evaluated during a distributed spam attempt, simulated by a custom-made traffic generator tool. Kubernetes architecture is used for system distribution, configured with the possibility of autoscaling the number of antispam SMTP server instances depending on the system load. In order to prevent resource overload during spam attacks, the anti-spam SMTP system is implemented in a distributed environment, as a group of multiple anti-spam SMTP server instances. The proposed solution extends SMTP protocol in order to enable the evaluation of the client?s credibility using the Proof of work algorithm. The aim of this paper is to design and implement an autoscalable distributed anti-spam SMTP system based on a Proof of work concept. Therefore, it is necessary to protect email users, but also to prevent SMTP system overload during spam attacks. ![]() Due to the increasing amount of spam email traffic, email users are in increasing danger, while email server resources are becoming overloaded.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |