IP Bouncer: An End-User Network Privacy Enhancing Tool

نویسندگان

  • Gregory Bott
  • Robert E. Crossler
چکیده

Internet Protocol (IP) Bouncer is a novel Information Technology (IT) artifact that exposes unexpected and unwanted network communication initiated by trusted “insider” applications. It closely follows design science guidelines illustrated in the five design principles of the artifact. One of the novel aspects of the design is the key-pair approach used for assessing appropriate or inappropriate network communications. By coupling the context-awareness of the user with online aggregators of blacklists, IP Bouncer offers greater individual and organizational security protection and earlier detection of network anomalies.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Wireless World Research Forum ( WWRF ) 1 Title : Enhancing end - users privacy in 3 G networks

Mobile/wireless Internet is becoming available with the advent of third generation (3G) mobile communication systems. Along with the variety of new perspectives, mobile Internet also raises new concerns on security issues. The radio transmission is by nature more susceptible to eavesdropping and fraud in use than wireline transmission. The user mobility and the universal network access certainl...

متن کامل

Regaining the end-users' trust with transparency-enhancing tools

With the constant news of data breaches and global (governmental) surveillance, endusers are becoming more and more reluctant to share sensitive data. As a result trust of end-users is an essential business enabler. For the end-user, sharing data with companies is often a prerequisite for using their services. Moreover, for certain services, e.g., governmental and healthcare services, end-users...

متن کامل

Privacy Enhancing Tools: A Literature Review on End-User Role and Evaluation

Trends show that privacy concerns are rising, but end users are not armed with enough mechanisms to protect themselves. Privacy enhancing technologies (PETs) or more specifically, tools (PET-tools) are one of the mechanisms that could help users in this sense. These tools, however, reportedly have low adoption rates, and users tend to be reluctant to integrate them into their daily use of the I...

متن کامل

SIP over IP VPN: Performance Analysis

With rapid growth in use of multimedia applications, including IP Telephony (also known as Voice over IP), the demand for security and privacy of communications has significantly increased. Given the fact that IP Telephony utilizes public IP infrastructure, deployment of IP VPN is one approach to protect traffic of interest. However, VPN is presumed to have a negative impact on VOIP performance...

متن کامل

Privacy Enhancing Technologies for RFID in Retail- An Empirical Investigation

This article investigates the conflicting area of user benefits arising through item level RFID tagging and a desire for privacy. It distinguishes between three approaches feasible to address consumer privacy concerns. One is to kill RFID tags at store exits. The second is to lock tags and have user unlock them if they want to initiate reader communication (user scheme). The third is to let the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015