The work has not been graded but I like the output that was submitted to me. Is it possible for the same prof to do the next assignment I will be submitting? If possible, I will greatly appreciate it.
Complete 103 pages APA formatted article: IS INTERNET ANONYMITY A MYTH OR REALITY. The aim of this research work is to analyse whether anonymity systems completely conceal the activity of a user or do they leave any residual information for others to identify the user. This research illustrates the different types and techniques of the anonymity tools. The low latency TOR network and the multi proxy aggregate services are discussed in detail along with the metrics for measuring anonymity. Based on these discussions, the major hypotheses of the research have been tested to find “Is Internet Anonymity a Myth or a Reality?” From the discussion of the design issues, implementation techniques, the types of attacks and the counter measures used to overcome the attacks, it has been found that in most of the scenarios, a common user could get acceptable level of anonymity by the usage of low latency networks like Tor and other multi proxy aggregate services. This is true because a common user may not expect an attack from a strong adversary. But when the user is a specific company or a government agency that requires more anonymity, then the expected adversary may be strong. To handle such a strong adversary, specific methods of improvement as suggested by researchers need to be adopted. The practical implementation of these techniques may be challenging. Thus internet anonymity is a myth for specific users who require extreme anonymity, but internet anonymity is a reality for a common user. Contents Chapter 1 – Research Introduction 1.1. Introduction 1.2. Background of the Research 1.3. Research Aim and Objectives 1.4. Main Research Question 1.5. Research Hypotheses 1.6. Scope of the Research 1.7. Research Organization 1.8. Chapter summary Chapter 2 – Preliminary Literature Review 2.1. The Internet Architecture 2.2. Anonymity in Internet 2.3. Primitive Anonymous technology 2.4. Anonymity Tools 2.4.1. Freedom 2.x 2.4.2. Remailers 2.4.3. Freehaven 2.4.4. Digicash 2.4.5. Internet Cash Cards 2.5. Legal issues 2.6. Anonymous Users 2.7. Chapter summary Chapter 3 – Network latency and Anonymity 3.1. Introduction 3.2. Anonymity by High Latency 3.3. Anonymity by Low latency 3.4. Network topology and latency 3.5. Latency without noise 3.6. Challenges in implementing latency networks 3.6.1. Design issues 220.127.116.11. Transportation of data 18.104.22.168. Mid-Level Latency 22.214.171.124. Configuring nodes 126.96.36.199. Diversified Location 3.6.2. Social Challenges 188.8.131.52. Usability 184.108.40.206. Social Value 220.127.116.11. Sustainability 18.104.22.168. Bandwidth and Speed 3.7. Client location and latency 3.8. Circuit linking and latency 3.9. Performance of low latency networks 3.10. Chapter summary Chapter 4 – Multi-proxy Aggregate Services 4.1. Introduction 4.2. Types of Proxy servers 4.3. Need for multi proxy systems 4.4. Implementation of proxy services 4.4.1. A proxy system for intrusion tolerance system 4.4.2. A proxy model for multi modal access to internet services 4.4.3. Anonymous Signature Scheme 4.5. Dynamic Proxies 4.6. Chapter summary Chapter 5 – TOR network 5.1. Introduction 5.2. TOR framework 5.3. The Onion Router Architecture 5.4. Second Generation TOR design 5.5. Cells in TOR 5.6. Circuit and streaming in TOR 5.6.1. Circuit construction 5.6.2. Streaming in Tor 5.7. Congestion Control 5.7.1. Throttling at circuit level 5.7.2.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more