A Novel Approach for Serving The Web By Exploiting Email Tunnels In Networks

Tammineni Anil kumar

Abstract


Traffic separating is shabby, compelling, and has little effect on other system administrations and in this way on most by far of clients in the oversight district who are not taking part in circumvention. Another issue with the current oversight circumvention frameworks is that they can't endure fractional bargain. Shockingly, existing oversight circumvention frameworks don't give high accessibility certifications to their clients, as controls can without much of a stretch distinguish, consequently upset, the traffic having a place with these frameworks utilizing the present propelled restriction innovations. In this paper, we propose Serving the Web by Exploiting Email Tunnels (SWEET), an exceedingly accessible restriction safe foundation. SWEET works by embodying an edited client's traffic inside email messages that are continued open email administrations like Gmail and Yahoo Mail. As the activity of SWEET isn't bound to an explicit email supplier, we contend that a blue pencil should square email interchanges all together so as to upset SWEET, which is impossible as email establishes an imperative piece of the present Internet.


References


J. Zittrain and B. Edelman, “Internet filtering in China,” IEEE InternetComput., vol. 7, no. 2, pp. 70–77, Mar. 2003.

(Nov. 2007). Defeat Internet Censorship: Overview ofAdvanced Technologies and Products. [Online]. Available: http://www.internetfreedom.org/archive/DefeatInternet Censorship WhitePaper.pd

C. S. Leberknight, M. Chiang, H. V. Poor, and F. Wong.(2010).A Taxonomy of Internet Censorship and Anti-Censorship.[Online].Available: http://www.princeton.edu/ chiangm/anticensorship.pdf

I. Clarke, S. G. Miller, T. W. Hong, O. Sandberg, and B. Wiley,“Protecting free expression online with freenet,” IEEE Internet Comput.,vol. 6, no. 1, pp. 40–49, Jan. 2002.

Ultrasurf, accessed on Jan. 7, 2017. [Online].Available:https://ultrasurf.us/

J. Jia and P. Smith. (2004). Psiphon: Analysis and Estimation.[Online]. Available: http://www.cdf.toronto.edu/ csc494h/reports/2004-fall/psiphon_ae.html

I. Cooper and J. Dilley, “Known HTTP proxy/caching problems,” IETF,Fremont, CA, USA, Tech. Rep. Internet RFC 3143, Jun. 2001.

R. Dingledine, N. Mathewson, and P. Syverson, “Tor: The secondgenerationonion router,” in Proc. USENIX Secur. Symp., 2004,pp. 21–37.

J. Boyan, “The anonymizer: Protecting user privacy on the Web,”Comput.-


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.