Seminar on Nymble: Anonymous IP-Address Blocking
#1

Seminar on Nymble: Anonymous IP-Address Blocking


.pdf   Anonymous IP-Address Blocking.pdf (Size: 650.05 KB / Downloads: 10)

Abstract

. Anonymizing networks such as Tor allow users to access Internet services
privately using a series of routers to hide the client’s IP address from the
server. Tor’s success, however, has been limited by users employing this anonymity
for abusive purposes, such as defacingWikipedia.Website administrators rely on IPaddress
blocking for disabling access to misbehaving users, but this is not practical
if the abuser routes through Tor. As a result, administrators block all Tor exit nodes,
denying anonymous access to honest and dishonest users alike.

Introduction

Anonymizing networks such as Crowds [25] and Tor [15] route traffic through independent
nodes in separate administrative domains to hide the originating IP address. Unfortunately,
misuse has limited the acceptance of deployed anonymizing networks. The anonymity provided
by such networks prevents website administrators from blacklisting individual malicious
users’ IP addresses; to thwart further abuse, they blacklist the entire anonymizing
network. Such measures eliminate malicious activity through anonymizing networks at the
cost of denying anonymous access to honest users. In other words, a few “bad apples” can
spoil the fun for all. (This has happened repeatedly with Tor.3).

Related Work

Anonymous credential systems such as Camenisch and Lysyanskaya’s [7,8] use group signatures
for anonymous authentication, wherein individual users are anonymous among a
group of registered users. Non-revocable group signatures such as Ring signatures [26]
provide no accountability and thus do not satisfy our needs to protect servers from misbehaving
users. Basic group signatures [1,2,3,12] allow revocation of anonymity by no
one except the group manager. As only the group manager can revoke a user’s anonymity,
servers have no way of linking signatures to previous ones and must query the group manager
for every signature; this lack of scalability makes it unsuitable for our goals. Traceable
signatures [18,30] allow the group manager to release a trapdoor that allows all signatures
generated by a particular user to be traced; such an approach does not provide the
backward anonymity that we desire, where a user’s accesses before the complaint remain
anonymous. Specifically, if the server is interested in blocking only future accesses of bad
users, then such reduction of user anonymity is unnecessarily drastic. When a user makes
an anonymous connection the connection should remain anonymous. And misbehaving
users should be blocked from making further connections after a complaint.
Reply
#2

sir i want another technical name for nymble
(08-02-2013, 11:49 AM)Guest Wrote: sir i want another technical name for nymble

Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: dfd for nymble project blocking anonymous network users for level 0 1 2, nymble anonymous ip address blocking ppt, anonymous ip address blocking, tor similar, ppt on nymble anonymous ip address blocking, ieee seminar report on anonymous communication with ppt, anonymous communication seminar report,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Optical Computer Full Seminar Report Download computer science crazy 46 66,688 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  Digital Signature Full Seminar Report Download computer science crazy 20 44,006 16-09-2015, 02:51 PM
Last Post: seminar report asees
  HOLOGRAPHIC VERSATILE DISC A SEMINAR REPORT Computer Science Clay 20 39,331 16-09-2015, 02:18 PM
Last Post: seminar report asees
  Computer Sci Seminar lists7 computer science crazy 4 11,493 17-07-2015, 10:29 AM
Last Post: dhanyasoubhagya
  Steganography In Images (Download Seminar Report) Computer Science Clay 16 25,817 08-06-2015, 03:26 PM
Last Post: seminar report asees
  Mobile Train Radio Communication ( Download Full Seminar Report ) computer science crazy 10 28,036 01-05-2015, 03:36 PM
Last Post: seminar report asees
  A SEMINAR REPORT on GRID COMPUTING Computer Science Clay 5 16,241 09-03-2015, 04:48 PM
Last Post: iyjwtfxgj
  SQL INJECTION A SEMINAR REPORT Computer Science Clay 10 12,109 18-10-2014, 09:50 PM
Last Post: jaseela123d
  Image Processing & Compression Techniques (Download Full Seminar Report) Computer Science Clay 42 22,968 07-10-2014, 07:57 PM
Last Post: seminar report asees
  IRIS SCANNING Full Seminar Report download Computer Science Clay 27 25,481 17-08-2014, 05:49 PM
Last Post: ewpltnbbq

Forum Jump: