Overview of Web Anonymization
AbstractWeb anonymization tools have been used for a long time, primarily by the users afraid of possible undesirable consequences of their on-line activity on the web. The paper analyzes both historically proven anonymization tools like TOR and newer tools, namely JAP/JonDo and CyberGhost VPN that are based on slightly modified technological principles. The primary focus is given to the measurement and evaluation of the latency increase and the transmission speed decrease in comparison to normal (non--anonymized) web browser operation. Results show that all anonymization tools being subject of the analysis provide relatively moderate latency increase. On the opposite, the transmission speed decrease was more significant, especially for JonDo.This confirms the conclusions of previous studies resulting that no anonymization tool is suitable for daily web browsing. On the other hand, in the case when higher anonymity is required, their use can be reasonably comfortable from the point of view of latency increase. However, their usefulness for downloading larger files is always disputable.
CyberGhost (n.d.) CyberGhost VPN. [online] Available at: http://www.cyberghostvpn.com/en. [Accessed 2017, October 25].
DINGLEDINE R., MATHEWSON N. and SYVERSON P. (n.d.). Tor: The Second-Generation Onion Router. [online]. Available at: https://svn.torproject.org/svn/projects/design-paper/tor- design.pdf. [Accessed 2017, October 25].
FEIGENBAUM, J., JOHNSON, A. and SYVERSON, P. 2012. Probabilistic analysis of onion routing in a black-box model. ACM Transactions on Information and System Security (TISSEC). 15(3), 14.
GLENNY, M. 2012. DarkMarket: How Hackers Became the New Ma a, London: Vintage Books.
I2P (n.d.) The Invisible Internet Project [online]. Available at: https://geti2p.net/en/, [Accessed 2017, October 25].
JAP (n.d.). Anonymity & privacy. Project AN.ON Anonymity Online. [online]. Available at: http://anon.inf.tu-dresden.de. [Accessed 2017, October 25].
KAPUSTA L. 2016. Tools and Techniques for Anonymous Www Communication. (Nastroje a techniky anonymni www komunikace, in Czech). University of Ostrava. Bc. thesis.
LISKA T., SOCHOR T., and SOCHOROVA H. 2010: Comparison between normal and TOR-anonymized web client tra c. Procedia – Social and Behavioral Sciences. Vol. 9, 542–546
SOCHOR T. 2012. Anonymization of web client tra c e ciency study. In: Gaj, P., Kwiecien, A., Stera, P. (eds.) Computer Networks: Proceedings of 19th Int. Conf. CN 2012. Berlin Heidelberg: Springer Verlag: CCIS, Vol. 291, 237–246
SOCHOR T. 2013. Automatic Control of Con guration of Web Anonymization. Int. Jour. of New Computer Architectures and Their Applications (IJNCAA). Vol. 3(2), 1–10
STATISTA.COM (n.d.) The Statistics Portal. [online]. Available at: https://www.statista.com/. [Accessed 2017, November 1].
ZUZCAK, M., SOCHOR, T. 2017. Behavioral analysis of bot activity in infected systems using honeypots. In: Gaj, P., Kwiecien, A., Sawicki, M. (eds.) Computer Networks: Pro- ceedings of 24th Int. Conf. CN 2017. Berlin Heidelberg: Springer Verlag: CCIS, Vol. 718, 118–133
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
It is allowed to reuse and remix the journal content in accordance with a CC BY-SA license (free to Share — copy and redistribute the material in any medium or format and Adapt — remix, transform, and build upon the material for any purpose, even commercially). The license lets others remix, tweak, and build upon your work even for commercial purposes, as long as they credit you and license their new creations under the identical terms. All new works based on yours will carry the same license, so any derivatives will also allow commercial use.
European Journal of Business Science and Technology by https://www.ejobsat.cz/ is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
EJOBSAT allows author/s to retain rights to copyright, and other proprietary rights relating to the publication - such as patent rights, the right to use the substance of the publication in future own works (including lectures and books), the right to reproduce the publication for own purposes (not for sale) and the right to self-archive the publication.