Welcome to the Internet Quality of Protection Research!
Let's do it!
Tell Me More

About Research

The current implementation of Internet Security services leaves users, especially those with limited computing skills, out of the security decision making process. This is because the security configuration parameters are either hidden from the user or the security decisions are centralised. As a result, many users do not implement the required level of Internet security to meet the required level of quality of protection. This lack of sufficient security configuration provides a fertile environment for Internet attacks. In the cases where the ISPs implement security services, the user is not provided with the associated cost information either monetary, privacy leakage or performance degradation. Such information would enable the user to make an informed decision on the right level of security to implement so as to enjoy a good internet browsing experience. The Internet Engineering Task Force (IETF) recommends that the user should be involved in security and privacy decisions. The challenge, however, is that there are many security and privacy protocols that achieve different security goals and these differences may add extra cost to the user due to the configuration complexity overhead, leading to poor quality of experience.

Research Aims

This study aims to investgate the use of a Security Cost Decision Model to allow users with limited computing skills to easily configure security options associated with costs that can map to complex security mechanisms to achieve Confidentiality, Integrity, Availability and Privacy (CIAP). Furthermore, this study investigates a decentralised internet security configuration tool by letting users decide on the required security level based on acceptable performance and privacy costs.

Research Questions

  1. What is the cost of integrated secure DNS and TLS cipher suites on the Quality of Internet browsing experience?
  2. What security and security design attributes should be considered to develop a security-performance classification model that maps to high-level user choices?
  3. How would a cost-aware security configuration framework impact users' Quality of Internet browsing Experience?
  4. How would a cost-aware security configuration framework impact users' adoption of Internet security mechanisms?

Research Approach

  1. Internet Security measurements- Adoption and performance impact of integrated TLS,DoH and DoT. We use both passive and active measurements
  2. Generative study on the desirable design attributes of a cost-aware decision Model
  3. Development of a cost-aware decision Model
  4. Evaluative user study and lab experiments

Participate

We would like to collect Internet security measurements from different African Countries using a command-line browser and a custom tool both running on docker. We are especially requesting well wishers to assist us take the measurements from their respective networks. This measurements study aims to look into the Research Question #1. We specifically want to measure the impact of Integrated web and DNS security on DNS Resolution Time (DRT) and Page Load Time (PLT) which are essential in determining the Quality of Experience (QoE). Resuslts will be shared to the participants which may improve quality of Internet protection in their respective networks. To conduct the measurements follow the following steps:

  1. Install Docker by following these instructions (Take note of the different instructions for different operating systems).
  2. Pull two repositories from Docker hub: (i) sudo docker pull tungs/dotdoh:Country, where Country is the name of the country you are measuring from. For example sudo docker pull tungs/dotdoh:Zambia  if you are measuring from Zambia. Currently I have 15 target countries: Botswana, Malawi, Madagascar, Mauritius, Uganda, Ghana, DRCongo,Nigeria,ZA,Senegal, Zambia, Zimbabwe, Kenya, Lesotho and Cameroon. If you you are from a different African Country than these and you are willing to participate, Use the form below to contact me. (ii) sudo docker pull tungs/har:firefox-67.0-stable
  3. Run the measurements by using the command : sudo docker run -p 8081:3000 -p 8443:443 -p 8080:80 -p 2202:22 --privileged -v /var/run/docker.sock:/var/run/docker.sock tungs/dotdoh:Country
  4. You are done. Wait for approximately 7 hours for the measurement to finish on 4G and run again on 3G. Each run uses about 4GB of Data. This tanslates to 8GB for the two runs. To be sure, make sure that you have 11GB of data taking into account the docker pulls. Send me a message on via the contact form below if you have any Questions
  5. The data bundle will be reimbursed with an added GBs as a token of appreciation. Thanks for partaking in this study

Resume

Know the researcher

  • 2019-date

    PhD Computer Science Candidate- Cybersecurity and Quality of Protection- UCT

    This is my second year into the research. Currently conducting measurements from African countries. You may take part by volunteering to measure security performance from your network. Learn More

  • 2017-date

    ICT Lecturer-Mzuzu University- Malawi, Africa

    Teaching and research in Network and Information Security, Mobile Telecommunications, e-Commerce and Artificial Intelligence

  • 2015-date

    Director and Founder- TechNix Malawi

    Leading in various project design and implementation

  • 2014-2016

    IT Manager- London School of Hygiene and Tropical Medicine

    Managing IT infrastructure, Managing IT and Data team

  • 2011-2014

    Network Engineer- NBS Bank Malawi Ltd

    Network Design, Installation, Administration, Monitoring and Security

Research Team

Links to full Bios

Enock Samuel Mbewe

PhD Researcher

 

Dr. Josiah Chavula

Supervisor

 

Thesis Committee

  1. Prof. Hussein Suleman
  2. Dr. David Johnson
  3. Prof. Rob Simmonds

I thank you all for helping in making Cyberspace secure and usable.

Special Thanks

With the deepest sense of gratitude I would like to thank the following organisations for supporting this work

Contact Us

Write us for more.