SlideShare a Scribd company logo
2nd review
By
DINESH RAJA K
ARAVINDHAN V
 Anonymzing networks such as Tor allow users to
access Internet services privately by using a series
of routers to hide the client’s IP address from the
server. The success of such networks, however, has
been limited by users employing this anonymity
for abusive purposes such as defacing popular Web
sites. Web site administrators routinely rely on IP-
address blocking for disabling access to
misbehaving users, but blocking IP addresses is
not practical if the abuser routes through an
anonymizing network.
As a result, administrators block all known exit
nodes of anonymizing networks, denying anonymous
access to misbehaving and behaving users alike. To
address this problem, we present Nymble, a system in
which servers can “blacklist” misbehaving users,
thereby blocking users without compromising their
anonymity. Our system is thus agnostic to different
servers’ definitions of misbehavior—servers can
blacklist users for whatever reason, and the privacy of
blacklisted users is maintained. In future work we are
processing admin report processing and prevention
 Web site administrators cannot blacklist
individual malicious users’ IP addresses, they
blacklist the entire anonymizing network.
 Traceable signatures allow the group manager to
release a trapdoor all signatures generated by a
particular user to be traced; such an approach does
not provide the backward unlink ability
 In existing process difficult to map more complex
notions of misbehavior onto “double spending”
 We present a secure system called Nymble, which
provides all the following properties: anonymous
authentication, backward unlinkability, subjective
blacklisting, fast authentication speeds, rate-
limited anonymous connections, revocation
auditability (where users can verify whether they
have been blacklisted), and also addresses the
Sybil attack to make its deployment practical.
 In Nymble, users acquire an ordered collection of
nymbles, a special type of pseudonym, to connect
toWebsites. Without additional information, these
nymbles are computationally hard to link,4 and hence,
using the stream of nymbles simulates anonymous
access to services. Web sites, however, can blacklist
users by obtaining a seed for a particular nymble,
allowing them to link future nymbles from the same
user—those used before the complaints remain
unlinkable.
 Servers can therefore blacklist anonymous users
without knowledge of their IP addresses while
allowing behaving users to connect anonymously
1. Resource-Based Blocking
2. The Pseudonym Manager
3. The Nymble Manager
 To limit the number of identities a user can obtain, the
Nymble system binds nymbles to resources that are
sufficiently difficult to obtain in great numbers.
Blacklisting anonymous users: We provide a means by
which servers can blacklist users of an anonymizing
network while maintaining their privacy.
 The user must first contact the Pseudonym Manager
(PM) and demonstrate control over a resource; for IP-
address blocking, the user must connect to the PM
directly (i.e., not through a known anonym zing
network), We assume the PM has knowledge about Tor
routers, for example, and can ensure that users are
communicating with it directly. Pseudonyms are
deterministically chosen based on the controlled
resource, ensuring that the same pseudonym is always
issued for the same resource.
 After obtaining a pseudonym from the PM, the user
connects to the Nymble Manager (NM) through the
anonymizing network, and requests nymbles for access to a
particular server (such as Wikipedia). A user’s requests to
the NM are therefore pseudonymous, and nymbles are
generated using the user’s pseudonym and the server’s
identity. These nymbles are thus specific to a particular
user-server pair. Nevertheless, as long as the PM and the
NM do not collude, the Nymble system cannot identify
which user is connecting to what server; the NM knows
only the pseudonym-server pair, and the PM knows only
the user identity-pseudonym
The hardware used for the development of the project is:
 PROCESSOR : PENTIUM III 766 MHz
 RAM : 128 MD SD RAM
 MONITOR : 15” COLOR
 HARD DISK : 20 GB
 FLOPPY DRIVE : 1.44 MB
 CDDRIVE : LG 52X
 KEYBOARD : STANDARD 102 KEYS
 MOUSE : 3 BUTTONS
The software used for the development of the project is:
 OPERATING SYSTEM : Windows XP
Professional
 ENVIRONMENT : Visual Studio
.NET 2008
 .NET FRAMEWORK : Version 2.0
 LANGUAGE : C#.NET
 WEB SERVER : Internet
Information Server 5.0
 BACK END : Sql server
2005
blocking misbehaving users in anonymizing networks full ppt with screenshots -2nd review !
Blocklist:
Manager:
Register:

Home:

User Register:

Admin Login:

Admin Home:

Pseudonym Manager:

User Activation:

Access Process:

Nymble Manager:

View Misused user:

User Login:

Process:

Process:

Webpage:

More Related Content

DOCX
Cumple lo ordenado
PPTX
Social networking and identity theft
PPTX
PDF
S.A.kalaiselvan blocking misbehaving users in anonymizing
PDF
Mobile Security
PPTX
Mobile Security
PDF
Mobile Security 101
PPTX
Mobile security
Cumple lo ordenado
Social networking and identity theft
S.A.kalaiselvan blocking misbehaving users in anonymizing
Mobile Security
Mobile Security
Mobile Security 101
Mobile security

Similar to blocking misbehaving users in anonymizing networks full ppt with screenshots -2nd review ! (20)

PPTX
Blocking Misbehaving Users In Anonymizing Network(1st review)
PDF
C0951520
PPTX
NYMBLE BLOCKING
PDF
Nymble: Blocking Misbehaving Users In Anonymizing Networks
PDF
A Novel Method for Blocking Misbehaving Users over Anonymizing Networks
PDF
If3614251429
PDF
If3614251429
PDF
Nymble blocking misbehaviouring users in anonymizing networks
PDF
Nymble blocking misbehaviouring users in anonymizing networks
PDF
Nymble blocking misbehaviouring users in anonymizing networks
PDF
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
PDF
PDF
PDF
NYMBLE: Servers Overcrowding Disobedient Users in Anonymizing Networks
PPTX
Blocking misbehaving users in anonymizing network-project ppt*
DOC
Nymble:Blocking misbehaving users in annoying networks(Link)
PPTX
cybersecurity unit 5 basics of cybersecurity
PDF
what is transport layer what are the typical attacks in transport l.pdf
PDF
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
PPT
Mutual Authentication For Wireless Communication
Blocking Misbehaving Users In Anonymizing Network(1st review)
C0951520
NYMBLE BLOCKING
Nymble: Blocking Misbehaving Users In Anonymizing Networks
A Novel Method for Blocking Misbehaving Users over Anonymizing Networks
If3614251429
If3614251429
Nymble blocking misbehaviouring users in anonymizing networks
Nymble blocking misbehaviouring users in anonymizing networks
Nymble blocking misbehaviouring users in anonymizing networks
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
NYMBLE: Servers Overcrowding Disobedient Users in Anonymizing Networks
Blocking misbehaving users in anonymizing network-project ppt*
Nymble:Blocking misbehaving users in annoying networks(Link)
cybersecurity unit 5 basics of cybersecurity
what is transport layer what are the typical attacks in transport l.pdf
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
Mutual Authentication For Wireless Communication
Ad

Recently uploaded (20)

PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
additive manufacturing of ss316l using mig welding
PPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
composite construction of structures.pdf
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
Sustainable Sites - Green Building Construction
PPT
Mechanical Engineering MATERIALS Selection
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Model Code of Practice - Construction Work - 21102022 .pdf
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
R24 SURVEYING LAB MANUAL for civil enggi
additive manufacturing of ss316l using mig welding
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
Embodied AI: Ushering in the Next Era of Intelligent Systems
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
composite construction of structures.pdf
UNIT-1 - COAL BASED THERMAL POWER PLANTS
UNIT 4 Total Quality Management .pptx
Sustainable Sites - Green Building Construction
Mechanical Engineering MATERIALS Selection
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
CH1 Production IntroductoryConcepts.pptx
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Ad

blocking misbehaving users in anonymizing networks full ppt with screenshots -2nd review !

  • 1. 2nd review By DINESH RAJA K ARAVINDHAN V
  • 2.  Anonymzing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client’s IP address from the server. The success of such networks, however, has been limited by users employing this anonymity for abusive purposes such as defacing popular Web sites. Web site administrators routinely rely on IP- address blocking for disabling access to misbehaving users, but blocking IP addresses is not practical if the abuser routes through an anonymizing network.
  • 3. As a result, administrators block all known exit nodes of anonymizing networks, denying anonymous access to misbehaving and behaving users alike. To address this problem, we present Nymble, a system in which servers can “blacklist” misbehaving users, thereby blocking users without compromising their anonymity. Our system is thus agnostic to different servers’ definitions of misbehavior—servers can blacklist users for whatever reason, and the privacy of blacklisted users is maintained. In future work we are processing admin report processing and prevention
  • 4.  Web site administrators cannot blacklist individual malicious users’ IP addresses, they blacklist the entire anonymizing network.  Traceable signatures allow the group manager to release a trapdoor all signatures generated by a particular user to be traced; such an approach does not provide the backward unlink ability  In existing process difficult to map more complex notions of misbehavior onto “double spending”
  • 5.  We present a secure system called Nymble, which provides all the following properties: anonymous authentication, backward unlinkability, subjective blacklisting, fast authentication speeds, rate- limited anonymous connections, revocation auditability (where users can verify whether they have been blacklisted), and also addresses the Sybil attack to make its deployment practical.
  • 6.  In Nymble, users acquire an ordered collection of nymbles, a special type of pseudonym, to connect toWebsites. Without additional information, these nymbles are computationally hard to link,4 and hence, using the stream of nymbles simulates anonymous access to services. Web sites, however, can blacklist users by obtaining a seed for a particular nymble, allowing them to link future nymbles from the same user—those used before the complaints remain unlinkable.
  • 7.  Servers can therefore blacklist anonymous users without knowledge of their IP addresses while allowing behaving users to connect anonymously
  • 8. 1. Resource-Based Blocking 2. The Pseudonym Manager 3. The Nymble Manager
  • 9.  To limit the number of identities a user can obtain, the Nymble system binds nymbles to resources that are sufficiently difficult to obtain in great numbers. Blacklisting anonymous users: We provide a means by which servers can blacklist users of an anonymizing network while maintaining their privacy.
  • 10.  The user must first contact the Pseudonym Manager (PM) and demonstrate control over a resource; for IP- address blocking, the user must connect to the PM directly (i.e., not through a known anonym zing network), We assume the PM has knowledge about Tor routers, for example, and can ensure that users are communicating with it directly. Pseudonyms are deterministically chosen based on the controlled resource, ensuring that the same pseudonym is always issued for the same resource.
  • 11.  After obtaining a pseudonym from the PM, the user connects to the Nymble Manager (NM) through the anonymizing network, and requests nymbles for access to a particular server (such as Wikipedia). A user’s requests to the NM are therefore pseudonymous, and nymbles are generated using the user’s pseudonym and the server’s identity. These nymbles are thus specific to a particular user-server pair. Nevertheless, as long as the PM and the NM do not collude, the Nymble system cannot identify which user is connecting to what server; the NM knows only the pseudonym-server pair, and the PM knows only the user identity-pseudonym
  • 12. The hardware used for the development of the project is:  PROCESSOR : PENTIUM III 766 MHz  RAM : 128 MD SD RAM  MONITOR : 15” COLOR  HARD DISK : 20 GB  FLOPPY DRIVE : 1.44 MB  CDDRIVE : LG 52X  KEYBOARD : STANDARD 102 KEYS  MOUSE : 3 BUTTONS
  • 13. The software used for the development of the project is:  OPERATING SYSTEM : Windows XP Professional  ENVIRONMENT : Visual Studio .NET 2008  .NET FRAMEWORK : Version 2.0  LANGUAGE : C#.NET  WEB SERVER : Internet Information Server 5.0  BACK END : Sql server 2005