Host Website from Home Anonymously

Main Article Content

Abstract

Hosting a website anonymously is possible by the infrastructure provided by the Onion Router which provides  anonymous connections that are strongly resistant to track web server which host the website. It hides not only  the server, but also traffic by using inbuilt feature of encrypting data stream. Onion Routing’s anonymous  connections are bidirectional and near real-time, and can be used anywhere even from home. Socket connections  used here to establish or terminate connection. It uses series of proxies to host website and other services like e mail etc. Website hosted with Onion Router can only be visit by using Tor Hidden Services. In order to access or  visit these websites on Tor, the client should be available on Tor network via Tor Browser. Tor includes its own  DNS resolver which will dispatch queries over the mix network. Each website hosted on Tor network has unique  Base 16 encoding with .onion extension.  Access to onion routing network can be configured through various  ways as per the needs, policies, and facilities of the connecting router. In this paper we discuss the anonymous  web services used to host website from home using Tor Network. The method proposed here provides reliable,  secure and cost effective alternative for hosting website. The discussion also includes the comparison of the  proposed facility with the standard web hosting features. 

Article Details

References

[1] Open Web Application Security Project, https://www.owasp.org/index.php/Category: Attack, visited on 1/11/ 2017.

[2] Acunetix Web Vulnerability Scanner, http://www.acunetix.com/, visited on 4/12/2017.

[3] NMAP Network Scanning, http://nmap.org/, visited on 15/12/2017.

[4] Gerald Combs – Wireshark, http://www.wireshark.org/, visited on 18/12/2017.

[5] Tor Project, https://www.torproject.org/, visited on 20/12/2017.

[6] J. P. Timpanaro, Monitoring the I2P Network, http://www.i2p2.de/papers.html, visited on 22/12/2017.

[7] JonDonym Anonymous Proxy Servers, http://anon.inf.tu- dresden.de/index_en.html, visited on 25/12/ 2017.

[8] University of Miami, http://it.med.miami.edu/x198.xml, visited on 28/12/2017.

[9] A. Pfitzmann, B. Pfitzmann and M. Waidner, “ISDN-Mixes: Untraceable Communication with Very Small Bandwidth Overhead”, GI/ITG Conference:Communication in Distributed Systems, Mannheim, Heildelberg, pp 451- 463 (1991).

[10]A. Iyengar, M. S. Squillante and L. Zhang, Analysis and characterization of large-scale web server access patterns and performance,

World Wide Web, 2(1-2), pp.85-100 (1999).

[11]Network Forensic Analysis of SSL MITM Attacks, http://www.netresec.com/?page=Blog&mont h=2011-03&post=Network ForensicAnalysis-of-SSL-MITM-Attacks, visited on 2/1/2018.

[12]E. Wimberley and N. Harrison, ”Morden Overflow Targets”, http://packetstormsecurity.com/files/downloa d/121751/ModernOverflowTargets.pdf, visited on 2/2/2018 .

[13]T. Khare, “Apache Tomcat 7 Essentials”,ePackt Publishing (2012).

[14]WAMP, http://www.wampserver.com/en/, visited on 5/2/2018.

[15]J. D. Ford and B.Smit, "A Framework for Assessing the Vulnerability of Communities in the Canadian Arctic to Risks Associated with Climate Change". ARCTIC ,57 (4),pp.389–400 (2004).

[16]Open Web Application Security Project Vulnerability Scanning Tool, https://www.owasp.org/index.php/Category: Vulnerability_Scanning_Tools, visited on 10/2/2018.

[17]You Get Signal, http://www.yougetsignal.com/tools/visualtracert/, visited on 20/3/2018.