Host Website from Home Anonymously
##plugins.themes.bootstrap3.article.main##
Abstract
Hosting a website anonymously is possible by the infrastructure provided by the Onion Router which provides
anonymous connections that are strongly resistant to track web server which host the website. It hides not only
the server, but also traffic by using inbuilt feature of encrypting data stream. Onion Routing’s anonymous
connections are bidirectional and near real-time, and can be used anywhere even from home. Socket connections
used here to establish or terminate connection. It uses series of proxies to host website and other services like e
mail etc. Website hosted with Onion Router can only be visit by using Tor Hidden Services. In order to access or
visit these websites on Tor, the client should be available on Tor network via Tor Browser. Tor includes its own
DNS resolver which will dispatch queries over the mix network. Each website hosted on Tor network has unique
Base 16 encoding with .onion extension. Access to onion routing network can be configured through various
ways as per the needs, policies, and facilities of the connecting router. In this paper we discuss the anonymous
web services used to host website from home using Tor Network. The method proposed here provides reliable,
secure and cost effective alternative for hosting website. The discussion also includes the comparison of the
proposed facility with the standard web hosting features.
References
[1] Open Web Application Security Project, https://www.owasp.org/index.php/Category: Attack, visited on 1/11/ 2017.
[2] Acunetix Web Vulnerability Scanner, http://www.acunetix.com/, visited on 4/12/2017.
[3] NMAP Network Scanning, http://nmap.org/, visited on 15/12/2017.
[4] Gerald Combs – Wireshark, http://www.wireshark.org/, visited on 18/12/2017.
[5] Tor Project, https://www.torproject.org/, visited on 20/12/2017.
[6] J. P. Timpanaro, Monitoring the I2P Network, http://www.i2p2.de/papers.html, visited on 22/12/2017.
[7] JonDonym Anonymous Proxy Servers, http://anon.inf.tu- dresden.de/index_en.html, visited on 25/12/ 2017.
[8] University of Miami, http://it.med.miami.edu/x198.xml, visited on 28/12/2017.
[9] A. Pfitzmann, B. Pfitzmann and M. Waidner, “ISDN-Mixes: Untraceable Communication with Very Small Bandwidth Overhead”, GI/ITG Conference:Communication in Distributed Systems, Mannheim, Heildelberg, pp 451- 463 (1991).
[10]A. Iyengar, M. S. Squillante and L. Zhang, Analysis and characterization of large-scale web server access patterns and performance,
World Wide Web, 2(1-2), pp.85-100 (1999).
[11]Network Forensic Analysis of SSL MITM Attacks, http://www.netresec.com/?page=Blog&mont h=2011-03&post=Network ForensicAnalysis-of-SSL-MITM-Attacks, visited on 2/1/2018.
[12]E. Wimberley and N. Harrison, ”Morden Overflow Targets”, http://packetstormsecurity.com/files/downloa d/121751/ModernOverflowTargets.pdf, visited on 2/2/2018 .
[13]T. Khare, “Apache Tomcat 7 Essentials”,ePackt Publishing (2012).
[14]WAMP, http://www.wampserver.com/en/, visited on 5/2/2018.
[15]J. D. Ford and B.Smit, "A Framework for Assessing the Vulnerability of Communities in the Canadian Arctic to Risks Associated with Climate Change". ARCTIC ,57 (4),pp.389–400 (2004).
[16]Open Web Application Security Project Vulnerability Scanning Tool, https://www.owasp.org/index.php/Category: Vulnerability_Scanning_Tools, visited on 10/2/2018.
[17]You Get Signal, http://www.yougetsignal.com/tools/visualtracert/, visited on 20/3/2018.
