SlideShare a Scribd company logo
1 of 10
Get Homework/Assignment Done
Homeworkping.com
Homework Help
https://www.homeworkping.com/
Research Paper help
https://www.homeworkping.com/
Online Tutoring
https://www.homeworkping.com/
click here for freelancing tutoring sites
NYMBLE: Blocking Misbehaving Users in Anonymizing
Networks
A thesis submitted in partial fulfillment of the academic
requirement for the award of degree of
MASTER OF TECHNOLOGY
(Computer Science & Engineering)
i
Submitted
By
Mohammad Zainuddin
(10R01D5809)
Under the Esteemed guidance of
Mr. D. Baswaraj
Associate Professor, Department of CSE
CMR INSTITUTE
OF
TECHNOLOGY
(Approved by AICTE, Affiliated to JNTU, Hyderabad)
Kandlakoya, Medchal Road, R.R. Dist. Hyderabad.
2011-2012
CMR INSTITUTE OF TECHNOLOGY
(Approved by AICTE, Affiliated to JNTU, Kukatpally)
Kandlakoya, Medchal Road, Hyderabad
Department of Computer Science & Engineering
ii
CERTIFICATE
This is to certify that the Thesis entitled “NYMBLE: Blocking Misbehaving Users in
Anonymizing Networks” is being submitted by Mohammad Zainuddin with H.T.No.
10R01D5809 in partial fulfillment of the requirement for the award of the degree of
M.Tech in Computer Science & Engineering to the Jawaharlal Nehru Technological
University Hyderabad is a record of bonafide work carried out by him under my/our
guidance and supervision from 24-10-2011 to 25-08-2012.
The results presented in this thesis have been verified and are found to be satisfactory. The
results embodied in this thesis have not been submitted to any other University for the
award of any other degree or diploma.
Internal Guide HOD Principal
(Mr. D. Baswaraj) (Prof. P. Pavan Kumar) (Dr. M. Janga Reddy)
EXTERNAL EXAMINER
ACKNOWLEDGMENT
I am extremely grateful to Dr. M. Janga Reddy, Principal and Prof. P. Pavan Kumar,
HOD, Department of CSE, CMR Institute of Technology.
I am extremely thankful to Mr. D. Baswaraj, Project Coordinator and Internal Guide,
Department of CSE, for his constant guidance, encouragement and moral support
throughout the project.
iii
I will be failing in duty if I do not acknowledge with grateful thanks to the authors of the
references and other literatures referred in this Project.
I express my thanks to all staff members and friends for all the help and co-ordination
extended in bringing out this Project successfully in time.
Finally, I am very much thankful to my parents who guided me for every step.
(Mohammad Zainuddin)
Date:
Place:
iv
ABSTRACT
Anonymizing networks such as Tor allow users to access Internet services privately by
using a series of routers to hide the client’s IP address from the server. The success of such
networks, however, has been limited by users employing this anonymity for abusive
purposes such as defacing popular websites.
Website administrators routinely rely on IP-address blocking for disabling access to
misbehaving users, but blocking IP addresses is not practical if the abuser routes through
an anonymizing network. As a result, administrators block all known exit nodes of
anonymizing networks, denying anonymous access to misbehaving and behaving users
alike. To address this problem, we present Nymble, a system in which servers can
“blacklist” misbehaving users, thereby blocking users without compromising their
anonymity. Our system is thus agnostic to different servers’ definitions of misbehavior —
servers can blacklist users for whatever reason, and the privacy of blacklisted users is
maintained.
v
CONTENTS
Sl.No. Particulars Page No.
1. Introduction 1
1.1. Problem Definition 2
1.2. Existing System and its Limitations 2
1.3. Proposed System 2
1.4. Advantages of Proposed System 3
1.5. Feasibility Study 4
1.6. Hardware and Software Requirements 5
1.7. Functional Requirements 5
1.8. Non-Functional Requirements 5
1.9. Pseudo Requirements 5
2. Literature Survey 6
2.1. Previous work done in blocking of users in anonymizing networks 6
2.1.1. Pseudonymous Credential Systems 6
2.1.2. Anonymous Credential Systems 8
2.1.3. Verifier-local Revocation (VLR) 9
2.2. Proposed Work 9
3. Analysis and Design 11
3.1. Modules Description 11
3.1.1. Nymble Manager 11
3.1.2. Pseudonym Manager 11
3.1.3. Blacklisting a User 11
3.1.4. Nymble-Authenticated Connection 11
3.2. Data Flow Diagrams 12
3.3. UML Diagrams 16
3.3.1. Use Case Diagram 16
3.3.2. Class Diagram 17
3.3.3. Sequence Diagram 18
3.3.4. Activity Diagram 19
3.3.5. Collaboration Diagram 20
4. Implementation 21
4.1. Process Specification 21
4.1.1. Input Design 21
4.1.2. Objectives 21
4.1.3. Output Design 21
4.2. Techniques Used 22
4.2.1. Blacklisting Anonymous Users 22
4.2.2. Practical Performance 22
4.2.3. Open-Source Implementation 22
4.3. Algorithms Used 23
4.3.1. Algorithm for Pseudonym Creation 23
4.3.2. Algorithm for Granting Nymble Tickets 23
4.3.3. Algorithm for Notifying Users about their status 24
vi
Sl.No. Particulars Page No.
4.4. Technology Description 25
4.4.1. Java Technology 25
4.4.2. The Java Programming Language 25
4.4.3. The Java Platform 27
4.4.4. What can Java Technology do? 27
4.4.5. How will Java Technology Change Life? 29
4.4.6. ODBC 30
4.4.7. JDBC 31
4.4.8. JDBC Goals 31
4.4.9. Networking 35
4.5. Sample Coding 39
4.5.1. Sample code for client login 39
4.5.2. Sample code for server login 43
4.5.3. Sample code for Nymble Manager 51
4.6. Screenshots 56
5. Testing and Debugging 77
5.1. Types of Testing 77
5.1.1. Black Box Testing 77
5.1.2. White Box Testing 77
5.1.3. Unit Testing 77
5.1.4. Test Strategy and Approach 77
5.2. Test Objectives 77
5.3. Features to be tested 78
5.3.1. System Testing 78
5.3.2. Integration Testing 78
5.3.3. Functional Testing 78
5.3.4. Test case table 79
5.3.5. Query 79
5.4. Test Plan 80
5.4.1. Bottom up approach 80
5.4.2. Top down approach 80
5.5. Test cases 80
6. Conclusion 82
7. Reference / Bibliography 83
8. Appendix 85
vii
List of Figures
Fig.No. Description Page No.
1. Project Architecture 3
2. Pseudonymous System Flow Diagram 7
3. Anonymous Credential Systems 8
4. Overview Nymble Design 10
5. DFD for Nymble Modules 13
6. Overview Flowchart of Whole Project 13
7. DFD for Server 14
8. DFD for Client 15
9. Use case Diagram for user login and server login 16
10. Class Diagram for user and nymble manager interaction 17
11. Sequence Diagram for client, server and NM interactions 18
12. Activity Diagram for user and server 19
13. Collaboration Diagram for Nymble System 20
14. Working of Interpreter 26
15. Working of Java Program 26
16. Java API 27
17. Java IDE 29
18. Java Program going through Compilers and Interpreter 34
viii
List of Tables
Table.No. Description Page No.
1. Nymble Server Login Test Table 80
2. Client Login Test Table 81
3. Blocking Test Table 81
List of Screenshots
SS.No. Particulars Page No.
1. Nymble Server 56
2. Nymble Server Invalid Login 57
3. Nymble Server Valid Login 58
4. Nymble Manager with Resources and handling blocked IP-addresses 59
5. Misbehaving Users Info 60
6. Client Registration 61
7. Server Registration 62
8. User Login 63
9. User Login Key 64
10. Available Resources 65
11. Accessing of File 66
12. Authenticate Nymble Page 67
13. Nymble Web Page-1 68
14. Nymble Web Page-2 69
ix
List of Screenshots
SS.No. Particulars Page No.
15. Server View Via Android Mobile 70
16. Pseudonym Manager-1 71
17. Pseudonym Manager-2 72
18. Invalid PWD for 1st
Time 73
19. Invalid PWD for 2nd
Time 74
20. Invalid PWD for 3rd
Time 75
21. Blocking of User on 3rd
Wrong Attempt 76
x

More Related Content

Similar to 200335827 certificates

Nymble blocking misbehaviouring users in anonymizing networks
Nymble blocking misbehaviouring users in anonymizing networksNymble blocking misbehaviouring users in anonymizing networks
Nymble blocking misbehaviouring users in anonymizing networksMuthu Samy
 
Nymble blocking misbehaviouring users in anonymizing networks
Nymble blocking misbehaviouring users in anonymizing networksNymble blocking misbehaviouring users in anonymizing networks
Nymble blocking misbehaviouring users in anonymizing networksMuthu Samy
 
Nymble blocking misbehaviouring users in anonymizing networks
Nymble blocking misbehaviouring users in anonymizing networksNymble blocking misbehaviouring users in anonymizing networks
Nymble blocking misbehaviouring users in anonymizing networksMuthu Samy
 
S.A.kalaiselvan blocking misbehaving users in anonymizing
S.A.kalaiselvan blocking misbehaving users in anonymizingS.A.kalaiselvan blocking misbehaving users in anonymizing
S.A.kalaiselvan blocking misbehaving users in anonymizingkalaiselvanresearch
 
HPH Project Report
HPH Project ReportHPH Project Report
HPH Project ReportMehul Jain
 
Authentication system with Decentralized chat app
Authentication system with Decentralized chat appAuthentication system with Decentralized chat app
Authentication system with Decentralized chat appIRJET Journal
 
MA Microservices Meetup: Move fast and make things
MA Microservices Meetup: Move fast and make thingsMA Microservices Meetup: Move fast and make things
MA Microservices Meetup: Move fast and make thingsAmbassador Labs
 
Quizine: An online Test
Quizine: An online TestQuizine: An online Test
Quizine: An online TestRandhir Gupta
 
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTINGNETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTINGNishanth Gandhidoss
 
How to write automated tests and don’t lose your mind by Dorian Sarnowski Scalac
How to write automated tests and don’t lose your mind by Dorian Sarnowski ScalacHow to write automated tests and don’t lose your mind by Dorian Sarnowski Scalac
How to write automated tests and don’t lose your mind by Dorian Sarnowski ScalacScalac
 
client-server-computing.pdf
client-server-computing.pdfclient-server-computing.pdf
client-server-computing.pdfscribdrg
 

Similar to 200335827 certificates (20)

Documentation
DocumentationDocumentation
Documentation
 
Nymble blocking misbehaviouring users in anonymizing networks
Nymble blocking misbehaviouring users in anonymizing networksNymble blocking misbehaviouring users in anonymizing networks
Nymble blocking misbehaviouring users in anonymizing networks
 
Nymble blocking misbehaviouring users in anonymizing networks
Nymble blocking misbehaviouring users in anonymizing networksNymble blocking misbehaviouring users in anonymizing networks
Nymble blocking misbehaviouring users in anonymizing networks
 
Nymble blocking misbehaviouring users in anonymizing networks
Nymble blocking misbehaviouring users in anonymizing networksNymble blocking misbehaviouring users in anonymizing networks
Nymble blocking misbehaviouring users in anonymizing networks
 
S.A.kalaiselvan blocking misbehaving users in anonymizing
S.A.kalaiselvan blocking misbehaving users in anonymizingS.A.kalaiselvan blocking misbehaving users in anonymizing
S.A.kalaiselvan blocking misbehaving users in anonymizing
 
ProjectReport_Subhayu
ProjectReport_SubhayuProjectReport_Subhayu
ProjectReport_Subhayu
 
HPH Project Report
HPH Project ReportHPH Project Report
HPH Project Report
 
Cerita
CeritaCerita
Cerita
 
combinepdf
combinepdfcombinepdf
combinepdf
 
As4301234238
As4301234238As4301234238
As4301234238
 
Authentication system with Decentralized chat app
Authentication system with Decentralized chat appAuthentication system with Decentralized chat app
Authentication system with Decentralized chat app
 
MA Microservices Meetup: Move fast and make things
MA Microservices Meetup: Move fast and make thingsMA Microservices Meetup: Move fast and make things
MA Microservices Meetup: Move fast and make things
 
Quizine: An online Test
Quizine: An online TestQuizine: An online Test
Quizine: An online Test
 
341 345
341 345341 345
341 345
 
341 345
341 345341 345
341 345
 
qadeer intern report.pdf
qadeer intern report.pdfqadeer intern report.pdf
qadeer intern report.pdf
 
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTINGNETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
 
How to write automated tests and don’t lose your mind by Dorian Sarnowski Scalac
How to write automated tests and don’t lose your mind by Dorian Sarnowski ScalacHow to write automated tests and don’t lose your mind by Dorian Sarnowski Scalac
How to write automated tests and don’t lose your mind by Dorian Sarnowski Scalac
 
client-server-computing.pdf
client-server-computing.pdfclient-server-computing.pdf
client-server-computing.pdf
 
locker presentation (1)
locker presentation (1)locker presentation (1)
locker presentation (1)
 

More from homeworkping4

242269855 dell-case-study
242269855 dell-case-study242269855 dell-case-study
242269855 dell-case-studyhomeworkping4
 
242266287 case-study-on-guil
242266287 case-study-on-guil242266287 case-study-on-guil
242266287 case-study-on-guilhomeworkping4
 
242259868 legal-research-cases
242259868 legal-research-cases242259868 legal-research-cases
242259868 legal-research-caseshomeworkping4
 
241999259 case-hemstoma-sukonjungtiva
241999259 case-hemstoma-sukonjungtiva241999259 case-hemstoma-sukonjungtiva
241999259 case-hemstoma-sukonjungtivahomeworkping4
 
241985748 plm-case-study
241985748 plm-case-study241985748 plm-case-study
241985748 plm-case-studyhomeworkping4
 
241946212 case-study-for-ocd
241946212 case-study-for-ocd241946212 case-study-for-ocd
241946212 case-study-for-ocdhomeworkping4
 
241941333 case-digest-statcon
241941333 case-digest-statcon241941333 case-digest-statcon
241941333 case-digest-statconhomeworkping4
 
241909563 impact-of-emergency
241909563 impact-of-emergency241909563 impact-of-emergency
241909563 impact-of-emergencyhomeworkping4
 
241905839 mpcvv-report
241905839 mpcvv-report241905839 mpcvv-report
241905839 mpcvv-reporthomeworkping4
 
241767629 ethics-cases
241767629 ethics-cases241767629 ethics-cases
241767629 ethics-caseshomeworkping4
 
241716493 separation-of-powers-cases
241716493 separation-of-powers-cases241716493 separation-of-powers-cases
241716493 separation-of-powers-caseshomeworkping4
 
241603963 drug-study-final
241603963 drug-study-final241603963 drug-study-final
241603963 drug-study-finalhomeworkping4
 
241573114 persons-cases
241573114 persons-cases241573114 persons-cases
241573114 persons-caseshomeworkping4
 
241566373 workshop-on-case-study
241566373 workshop-on-case-study241566373 workshop-on-case-study
241566373 workshop-on-case-studyhomeworkping4
 
241524597 succession-full-cases
241524597 succession-full-cases241524597 succession-full-cases
241524597 succession-full-caseshomeworkping4
 
241299249 pale-cases-batch-2
241299249 pale-cases-batch-2241299249 pale-cases-batch-2
241299249 pale-cases-batch-2homeworkping4
 
241262134 rubab-thesis
241262134 rubab-thesis241262134 rubab-thesis
241262134 rubab-thesishomeworkping4
 
241259161 citizenship-case-digests
241259161 citizenship-case-digests241259161 citizenship-case-digests
241259161 citizenship-case-digestshomeworkping4
 

More from homeworkping4 (20)

242269855 dell-case-study
242269855 dell-case-study242269855 dell-case-study
242269855 dell-case-study
 
242266287 case-study-on-guil
242266287 case-study-on-guil242266287 case-study-on-guil
242266287 case-study-on-guil
 
242259868 legal-research-cases
242259868 legal-research-cases242259868 legal-research-cases
242259868 legal-research-cases
 
241999259 case-hemstoma-sukonjungtiva
241999259 case-hemstoma-sukonjungtiva241999259 case-hemstoma-sukonjungtiva
241999259 case-hemstoma-sukonjungtiva
 
241985748 plm-case-study
241985748 plm-case-study241985748 plm-case-study
241985748 plm-case-study
 
241946212 case-study-for-ocd
241946212 case-study-for-ocd241946212 case-study-for-ocd
241946212 case-study-for-ocd
 
241941333 case-digest-statcon
241941333 case-digest-statcon241941333 case-digest-statcon
241941333 case-digest-statcon
 
241909563 impact-of-emergency
241909563 impact-of-emergency241909563 impact-of-emergency
241909563 impact-of-emergency
 
241905839 mpcvv-report
241905839 mpcvv-report241905839 mpcvv-report
241905839 mpcvv-report
 
241767629 ethics-cases
241767629 ethics-cases241767629 ethics-cases
241767629 ethics-cases
 
241716493 separation-of-powers-cases
241716493 separation-of-powers-cases241716493 separation-of-powers-cases
241716493 separation-of-powers-cases
 
241603963 drug-study-final
241603963 drug-study-final241603963 drug-study-final
241603963 drug-study-final
 
241585426 cases-vii
241585426 cases-vii241585426 cases-vii
241585426 cases-vii
 
241573114 persons-cases
241573114 persons-cases241573114 persons-cases
241573114 persons-cases
 
241566373 workshop-on-case-study
241566373 workshop-on-case-study241566373 workshop-on-case-study
241566373 workshop-on-case-study
 
241524597 succession-full-cases
241524597 succession-full-cases241524597 succession-full-cases
241524597 succession-full-cases
 
241356684 citibank
241356684 citibank241356684 citibank
241356684 citibank
 
241299249 pale-cases-batch-2
241299249 pale-cases-batch-2241299249 pale-cases-batch-2
241299249 pale-cases-batch-2
 
241262134 rubab-thesis
241262134 rubab-thesis241262134 rubab-thesis
241262134 rubab-thesis
 
241259161 citizenship-case-digests
241259161 citizenship-case-digests241259161 citizenship-case-digests
241259161 citizenship-case-digests
 

Recently uploaded

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 

Recently uploaded (20)

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 

200335827 certificates

  • 1. Get Homework/Assignment Done Homeworkping.com Homework Help https://www.homeworkping.com/ Research Paper help https://www.homeworkping.com/ Online Tutoring https://www.homeworkping.com/ click here for freelancing tutoring sites NYMBLE: Blocking Misbehaving Users in Anonymizing Networks A thesis submitted in partial fulfillment of the academic requirement for the award of degree of MASTER OF TECHNOLOGY (Computer Science & Engineering) i
  • 2. Submitted By Mohammad Zainuddin (10R01D5809) Under the Esteemed guidance of Mr. D. Baswaraj Associate Professor, Department of CSE CMR INSTITUTE OF TECHNOLOGY (Approved by AICTE, Affiliated to JNTU, Hyderabad) Kandlakoya, Medchal Road, R.R. Dist. Hyderabad. 2011-2012 CMR INSTITUTE OF TECHNOLOGY (Approved by AICTE, Affiliated to JNTU, Kukatpally) Kandlakoya, Medchal Road, Hyderabad Department of Computer Science & Engineering ii
  • 3. CERTIFICATE This is to certify that the Thesis entitled “NYMBLE: Blocking Misbehaving Users in Anonymizing Networks” is being submitted by Mohammad Zainuddin with H.T.No. 10R01D5809 in partial fulfillment of the requirement for the award of the degree of M.Tech in Computer Science & Engineering to the Jawaharlal Nehru Technological University Hyderabad is a record of bonafide work carried out by him under my/our guidance and supervision from 24-10-2011 to 25-08-2012. The results presented in this thesis have been verified and are found to be satisfactory. The results embodied in this thesis have not been submitted to any other University for the award of any other degree or diploma. Internal Guide HOD Principal (Mr. D. Baswaraj) (Prof. P. Pavan Kumar) (Dr. M. Janga Reddy) EXTERNAL EXAMINER ACKNOWLEDGMENT I am extremely grateful to Dr. M. Janga Reddy, Principal and Prof. P. Pavan Kumar, HOD, Department of CSE, CMR Institute of Technology. I am extremely thankful to Mr. D. Baswaraj, Project Coordinator and Internal Guide, Department of CSE, for his constant guidance, encouragement and moral support throughout the project. iii
  • 4. I will be failing in duty if I do not acknowledge with grateful thanks to the authors of the references and other literatures referred in this Project. I express my thanks to all staff members and friends for all the help and co-ordination extended in bringing out this Project successfully in time. Finally, I am very much thankful to my parents who guided me for every step. (Mohammad Zainuddin) Date: Place: iv
  • 5. ABSTRACT Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client’s IP address from the server. The success of such networks, however, has been limited by users employing this anonymity for abusive purposes such as defacing popular websites. Website administrators routinely rely on IP-address blocking for disabling access to misbehaving users, but blocking IP addresses is not practical if the abuser routes through an anonymizing network. As a result, administrators block all known exit nodes of anonymizing networks, denying anonymous access to misbehaving and behaving users alike. To address this problem, we present Nymble, a system in which servers can “blacklist” misbehaving users, thereby blocking users without compromising their anonymity. Our system is thus agnostic to different servers’ definitions of misbehavior — servers can blacklist users for whatever reason, and the privacy of blacklisted users is maintained. v
  • 6. CONTENTS Sl.No. Particulars Page No. 1. Introduction 1 1.1. Problem Definition 2 1.2. Existing System and its Limitations 2 1.3. Proposed System 2 1.4. Advantages of Proposed System 3 1.5. Feasibility Study 4 1.6. Hardware and Software Requirements 5 1.7. Functional Requirements 5 1.8. Non-Functional Requirements 5 1.9. Pseudo Requirements 5 2. Literature Survey 6 2.1. Previous work done in blocking of users in anonymizing networks 6 2.1.1. Pseudonymous Credential Systems 6 2.1.2. Anonymous Credential Systems 8 2.1.3. Verifier-local Revocation (VLR) 9 2.2. Proposed Work 9 3. Analysis and Design 11 3.1. Modules Description 11 3.1.1. Nymble Manager 11 3.1.2. Pseudonym Manager 11 3.1.3. Blacklisting a User 11 3.1.4. Nymble-Authenticated Connection 11 3.2. Data Flow Diagrams 12 3.3. UML Diagrams 16 3.3.1. Use Case Diagram 16 3.3.2. Class Diagram 17 3.3.3. Sequence Diagram 18 3.3.4. Activity Diagram 19 3.3.5. Collaboration Diagram 20 4. Implementation 21 4.1. Process Specification 21 4.1.1. Input Design 21 4.1.2. Objectives 21 4.1.3. Output Design 21 4.2. Techniques Used 22 4.2.1. Blacklisting Anonymous Users 22 4.2.2. Practical Performance 22 4.2.3. Open-Source Implementation 22 4.3. Algorithms Used 23 4.3.1. Algorithm for Pseudonym Creation 23 4.3.2. Algorithm for Granting Nymble Tickets 23 4.3.3. Algorithm for Notifying Users about their status 24 vi
  • 7. Sl.No. Particulars Page No. 4.4. Technology Description 25 4.4.1. Java Technology 25 4.4.2. The Java Programming Language 25 4.4.3. The Java Platform 27 4.4.4. What can Java Technology do? 27 4.4.5. How will Java Technology Change Life? 29 4.4.6. ODBC 30 4.4.7. JDBC 31 4.4.8. JDBC Goals 31 4.4.9. Networking 35 4.5. Sample Coding 39 4.5.1. Sample code for client login 39 4.5.2. Sample code for server login 43 4.5.3. Sample code for Nymble Manager 51 4.6. Screenshots 56 5. Testing and Debugging 77 5.1. Types of Testing 77 5.1.1. Black Box Testing 77 5.1.2. White Box Testing 77 5.1.3. Unit Testing 77 5.1.4. Test Strategy and Approach 77 5.2. Test Objectives 77 5.3. Features to be tested 78 5.3.1. System Testing 78 5.3.2. Integration Testing 78 5.3.3. Functional Testing 78 5.3.4. Test case table 79 5.3.5. Query 79 5.4. Test Plan 80 5.4.1. Bottom up approach 80 5.4.2. Top down approach 80 5.5. Test cases 80 6. Conclusion 82 7. Reference / Bibliography 83 8. Appendix 85 vii
  • 8. List of Figures Fig.No. Description Page No. 1. Project Architecture 3 2. Pseudonymous System Flow Diagram 7 3. Anonymous Credential Systems 8 4. Overview Nymble Design 10 5. DFD for Nymble Modules 13 6. Overview Flowchart of Whole Project 13 7. DFD for Server 14 8. DFD for Client 15 9. Use case Diagram for user login and server login 16 10. Class Diagram for user and nymble manager interaction 17 11. Sequence Diagram for client, server and NM interactions 18 12. Activity Diagram for user and server 19 13. Collaboration Diagram for Nymble System 20 14. Working of Interpreter 26 15. Working of Java Program 26 16. Java API 27 17. Java IDE 29 18. Java Program going through Compilers and Interpreter 34 viii
  • 9. List of Tables Table.No. Description Page No. 1. Nymble Server Login Test Table 80 2. Client Login Test Table 81 3. Blocking Test Table 81 List of Screenshots SS.No. Particulars Page No. 1. Nymble Server 56 2. Nymble Server Invalid Login 57 3. Nymble Server Valid Login 58 4. Nymble Manager with Resources and handling blocked IP-addresses 59 5. Misbehaving Users Info 60 6. Client Registration 61 7. Server Registration 62 8. User Login 63 9. User Login Key 64 10. Available Resources 65 11. Accessing of File 66 12. Authenticate Nymble Page 67 13. Nymble Web Page-1 68 14. Nymble Web Page-2 69 ix
  • 10. List of Screenshots SS.No. Particulars Page No. 15. Server View Via Android Mobile 70 16. Pseudonym Manager-1 71 17. Pseudonym Manager-2 72 18. Invalid PWD for 1st Time 73 19. Invalid PWD for 2nd Time 74 20. Invalid PWD for 3rd Time 75 21. Blocking of User on 3rd Wrong Attempt 76 x