Proposal for easily detachable proxy for personal information leakage detection

Tomokazu Hayakawa, Teruo Hikita

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper proposes an easily attachable/detachable proxy that helps ordinary computer users detect their personal information leakage caused by malicious software. This proxy can behave as a stealth proxy or as a transparent proxy, meaning that the proxy can be placed at any point in a TCP/IP network. Users of this proxy can detect and stop any suspicious TCP/IP connections by placing the proxy at any appropriate point in their network and by using the bundled controller Web application that controls behavior of the proxy. We have used a Raspberry Pi and HTML5 for the proxy implementation, thus making this method affordable and portable. We evaluated the proxy by placing it at several places in the network, and confirmed that the proxy properly works and helps users detect suspicious TCP/IP connections by visualizing them between their computers and the Internet.

Original languageEnglish
Title of host publicationComputer Science and Its Applications - Ubiquitous Information Technologies
EditorsHwa Young Jeong, Ivan Stojmenovic, James J. Park, Gangman Yi
PublisherSpringer Verlag
Pages21-27
Number of pages7
ISBN (Electronic)9783662454015
DOIs
Publication statusPublished - 1 Jan 2015
Event6th FTRA International Conference on Computer Science and its Applications, CSA 2014 - Guam, United States
Duration: 17 Dec 201419 Dec 2014

Publication series

NameLecture Notes in Electrical Engineering
Volume330
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Conference

Conference6th FTRA International Conference on Computer Science and its Applications, CSA 2014
CountryUnited States
CityGuam
Period17/12/1419/12/14

Keywords

  • Bridge
  • HTML5
  • Information leakage
  • Proxy
  • Raspberry Pi
  • Security

Fingerprint Dive into the research topics of 'Proposal for easily detachable proxy for personal information leakage detection'. Together they form a unique fingerprint.

  • Cite this

    Hayakawa, T., & Hikita, T. (2015). Proposal for easily detachable proxy for personal information leakage detection. In H. Y. Jeong, I. Stojmenovic, J. J. Park, & G. Yi (Eds.), Computer Science and Its Applications - Ubiquitous Information Technologies (pp. 21-27). (Lecture Notes in Electrical Engineering; Vol. 330). Springer Verlag. https://doi.org/10.1007/978-3-662-45402-2_4