SlideShare a Scribd company logo
2nd review
By
DINESH RAJA K
ARAVINDHAN V
 Anonymzing networks such as Tor allow users to
access Internet services privately by using a series
of routers to hide the client’s IP address from the
server. The success of such networks, however, has
been limited by users employing this anonymity
for abusive purposes such as defacing popular Web
sites. Web site administrators routinely rely on IP-
address blocking for disabling access to
misbehaving users, but blocking IP addresses is
not practical if the abuser routes through an
anonymizing network.
As a result, administrators block all known exit
nodes of anonymizing networks, denying anonymous
access to misbehaving and behaving users alike. To
address this problem, we present Nymble, a system in
which servers can “blacklist” misbehaving users,
thereby blocking users without compromising their
anonymity. Our system is thus agnostic to different
servers’ definitions of misbehavior—servers can
blacklist users for whatever reason, and the privacy of
blacklisted users is maintained. In future work we are
processing admin report processing and prevention
 Web site administrators cannot blacklist
individual malicious users’ IP addresses, they
blacklist the entire anonymizing network.
 Traceable signatures allow the group manager to
release a trapdoor all signatures generated by a
particular user to be traced; such an approach does
not provide the backward unlink ability
 In existing process difficult to map more complex
notions of misbehavior onto “double spending”
 We present a secure system called Nymble, which
provides all the following properties: anonymous
authentication, backward unlinkability, subjective
blacklisting, fast authentication speeds, rate-
limited anonymous connections, revocation
auditability (where users can verify whether they
have been blacklisted), and also addresses the
Sybil attack to make its deployment practical.
 In Nymble, users acquire an ordered collection of
nymbles, a special type of pseudonym, to connect
toWebsites. Without additional information, these
nymbles are computationally hard to link,4 and hence,
using the stream of nymbles simulates anonymous
access to services. Web sites, however, can blacklist
users by obtaining a seed for a particular nymble,
allowing them to link future nymbles from the same
user—those used before the complaints remain
unlinkable.
 Servers can therefore blacklist anonymous users
without knowledge of their IP addresses while
allowing behaving users to connect anonymously
1. Resource-Based Blocking
2. The Pseudonym Manager
3. The Nymble Manager
 To limit the number of identities a user can obtain, the
Nymble system binds nymbles to resources that are
sufficiently difficult to obtain in great numbers.
Blacklisting anonymous users: We provide a means by
which servers can blacklist users of an anonymizing
network while maintaining their privacy.
 The user must first contact the Pseudonym Manager
(PM) and demonstrate control over a resource; for IP-
address blocking, the user must connect to the PM
directly (i.e., not through a known anonym zing
network), We assume the PM has knowledge about Tor
routers, for example, and can ensure that users are
communicating with it directly. Pseudonyms are
deterministically chosen based on the controlled
resource, ensuring that the same pseudonym is always
issued for the same resource.
 After obtaining a pseudonym from the PM, the user
connects to the Nymble Manager (NM) through the
anonymizing network, and requests nymbles for access to a
particular server (such as Wikipedia). A user’s requests to
the NM are therefore pseudonymous, and nymbles are
generated using the user’s pseudonym and the server’s
identity. These nymbles are thus specific to a particular
user-server pair. Nevertheless, as long as the PM and the
NM do not collude, the Nymble system cannot identify
which user is connecting to what server; the NM knows
only the pseudonym-server pair, and the PM knows only
the user identity-pseudonym
The hardware used for the development of the project is:
 PROCESSOR : PENTIUM III 766 MHz
 RAM : 128 MD SD RAM
 MONITOR : 15” COLOR
 HARD DISK : 20 GB
 FLOPPY DRIVE : 1.44 MB
 CDDRIVE : LG 52X
 KEYBOARD : STANDARD 102 KEYS
 MOUSE : 3 BUTTONS
The software used for the development of the project is:
 OPERATING SYSTEM : Windows XP
Professional
 ENVIRONMENT : Visual Studio
.NET 2008
 .NET FRAMEWORK : Version 2.0
 LANGUAGE : C#.NET
 WEB SERVER : Internet
Information Server 5.0
 BACK END : Sql server
2005
Blocklist:
Manager:
Register:

Home:

User Register:

Admin Login:

Admin Home:

Pseudonym Manager:

User Activation:

Access Process:

Nymble Manager:

View Misused user:

User Login:

Process:

Process:

Webpage:

More Related Content

What's hot

User Authentication: Passwords and Beyond
User Authentication: Passwords and BeyondUser Authentication: Passwords and Beyond
User Authentication: Passwords and Beyond
Jim Fenton
 
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Okan YILDIZ
 
PHISHING DETECTION
PHISHING DETECTIONPHISHING DETECTION
PHISHING DETECTIONumme ayesha
 
Sql injection
Sql injectionSql injection
Sql injection
Zidh
 
Phishing Detection using Machine Learning
Phishing Detection using Machine LearningPhishing Detection using Machine Learning
Phishing Detection using Machine Learning
Arjun BM
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
Jorge Sebastiao
 
Deep learning approach for network intrusion detection system
Deep learning approach for network intrusion detection systemDeep learning approach for network intrusion detection system
Deep learning approach for network intrusion detection system
Avinash Kumar
 
Detection of phishing websites
Detection of phishing websitesDetection of phishing websites
Detection of phishing websites
m srikanth
 
Azure 仮想マシンとRemoteAppの超概要
Azure 仮想マシンとRemoteAppの超概要Azure 仮想マシンとRemoteAppの超概要
Azure 仮想マシンとRemoteAppの超概要
Daiyu Hatakeyama
 
Zero trust in a multi tenant environment
Zero trust in a multi tenant environment  Zero trust in a multi tenant environment
Zero trust in a multi tenant environment
Ashnikbiz
 
Chapter 6 slides
Chapter 6 slidesChapter 6 slides
Chapter 6 slideslara_ays
 
An optimized scientific workflow scheduling in cloud computing
An optimized scientific workflow scheduling in cloud computingAn optimized scientific workflow scheduling in cloud computing
An optimized scientific workflow scheduling in cloud computing
DIGVIJAY SHINDE
 
Malicious-URL Detection using Logistic Regression Technique
Malicious-URL Detection using Logistic Regression TechniqueMalicious-URL Detection using Logistic Regression Technique
Malicious-URL Detection using Logistic Regression Technique
Dr. Amarjeet Singh
 
Cross Site Request Forgery (CSRF) Scripting Explained
Cross Site Request Forgery (CSRF) Scripting ExplainedCross Site Request Forgery (CSRF) Scripting Explained
Cross Site Request Forgery (CSRF) Scripting Explained
Valency Networks
 
Metasploit
MetasploitMetasploit
Metasploit
henelpj
 
Sql injection
Sql injectionSql injection
Sql injection
Sasha-Leigh Garret
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safely
Tom Eston
 
Fundamental cloud security
Fundamental cloud securityFundamental cloud security
Fundamental cloud securityAsmaa Ibrahim
 
Complex architectures for authentication and authorization on AWS
Complex architectures for authentication and authorization on AWSComplex architectures for authentication and authorization on AWS
Complex architectures for authentication and authorization on AWS
Boyan Dimitrov
 

What's hot (20)

User Authentication: Passwords and Beyond
User Authentication: Passwords and BeyondUser Authentication: Passwords and Beyond
User Authentication: Passwords and Beyond
 
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
 
PHISHING DETECTION
PHISHING DETECTIONPHISHING DETECTION
PHISHING DETECTION
 
Sql injection
Sql injectionSql injection
Sql injection
 
Phishing Detection using Machine Learning
Phishing Detection using Machine LearningPhishing Detection using Machine Learning
Phishing Detection using Machine Learning
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Deep learning approach for network intrusion detection system
Deep learning approach for network intrusion detection systemDeep learning approach for network intrusion detection system
Deep learning approach for network intrusion detection system
 
Detection of phishing websites
Detection of phishing websitesDetection of phishing websites
Detection of phishing websites
 
Azure 仮想マシンとRemoteAppの超概要
Azure 仮想マシンとRemoteAppの超概要Azure 仮想マシンとRemoteAppの超概要
Azure 仮想マシンとRemoteAppの超概要
 
Zero trust in a multi tenant environment
Zero trust in a multi tenant environment  Zero trust in a multi tenant environment
Zero trust in a multi tenant environment
 
Chapter 6 slides
Chapter 6 slidesChapter 6 slides
Chapter 6 slides
 
An optimized scientific workflow scheduling in cloud computing
An optimized scientific workflow scheduling in cloud computingAn optimized scientific workflow scheduling in cloud computing
An optimized scientific workflow scheduling in cloud computing
 
Malicious-URL Detection using Logistic Regression Technique
Malicious-URL Detection using Logistic Regression TechniqueMalicious-URL Detection using Logistic Regression Technique
Malicious-URL Detection using Logistic Regression Technique
 
Cross Site Request Forgery (CSRF) Scripting Explained
Cross Site Request Forgery (CSRF) Scripting ExplainedCross Site Request Forgery (CSRF) Scripting Explained
Cross Site Request Forgery (CSRF) Scripting Explained
 
Bug bounty
Bug bountyBug bounty
Bug bounty
 
Metasploit
MetasploitMetasploit
Metasploit
 
Sql injection
Sql injectionSql injection
Sql injection
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safely
 
Fundamental cloud security
Fundamental cloud securityFundamental cloud security
Fundamental cloud security
 
Complex architectures for authentication and authorization on AWS
Complex architectures for authentication and authorization on AWSComplex architectures for authentication and authorization on AWS
Complex architectures for authentication and authorization on AWS
 

Viewers also liked

Seminar
SeminarSeminar
S.A.kalaiselvan blocking misbehaving users in anonymizing
S.A.kalaiselvan blocking misbehaving users in anonymizingS.A.kalaiselvan blocking misbehaving users in anonymizing
S.A.kalaiselvan blocking misbehaving users in anonymizing
kalaiselvanresearch
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
MarketingArrowECS_CZ
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
JASHU JASWANTH
 
Mobile Security
Mobile SecurityMobile Security
Mobile SecurityKevin Lee
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
Lookout
 
Mobile security
Mobile securityMobile security
Mobile securityhome
 
Mobile security
Mobile securityMobile security
Mobile security
Basant Kumar
 

Viewers also liked (9)

Seminar
SeminarSeminar
Seminar
 
S.A.kalaiselvan blocking misbehaving users in anonymizing
S.A.kalaiselvan blocking misbehaving users in anonymizingS.A.kalaiselvan blocking misbehaving users in anonymizing
S.A.kalaiselvan blocking misbehaving users in anonymizing
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile security - Intense overview
Mobile security - Intense overviewMobile security - Intense overview
Mobile security - Intense overview
 
Mobile security
Mobile securityMobile security
Mobile security
 

Similar to blocking misbehaving users in anonymizing networks full ppt with screenshots -2nd review !

Blocking Misbehaving Users In Anonymizing Network(1st review)
Blocking Misbehaving Users In Anonymizing Network(1st review)Blocking Misbehaving Users In Anonymizing Network(1st review)
Blocking Misbehaving Users In Anonymizing Network(1st review)
dinesh krishna
 
Nymble: Blocking Misbehaving Users In Anonymizing Networks
Nymble: Blocking Misbehaving Users In Anonymizing NetworksNymble: Blocking Misbehaving Users In Anonymizing Networks
Nymble: Blocking Misbehaving Users In Anonymizing Networks
IOSR Journals
 
A Novel Method for Blocking Misbehaving Users over Anonymizing Networks
A Novel Method for Blocking Misbehaving Users over Anonymizing NetworksA Novel Method for Blocking Misbehaving Users over Anonymizing Networks
A Novel Method for Blocking Misbehaving Users over Anonymizing Networks
IJMER
 
If3614251429
If3614251429If3614251429
If3614251429
IJERA Editor
 
Nymble blocking misbehaviouring users in anonymizing networks
Nymble blocking misbehaviouring users in anonymizing networksNymble blocking misbehaviouring users in anonymizing networks
Nymble blocking misbehaviouring users in anonymizing networks
Muthu Samy
 
Nymble blocking misbehaviouring users in anonymizing networks
Nymble blocking misbehaviouring users in anonymizing networksNymble blocking misbehaviouring users in anonymizing networks
Nymble blocking misbehaviouring users in anonymizing networks
Muthu Samy
 
Nymble blocking misbehaviouring users in anonymizing networks
Nymble blocking misbehaviouring users in anonymizing networksNymble blocking misbehaviouring users in anonymizing networks
Nymble blocking misbehaviouring users in anonymizing networks
Muthu Samy
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
NYMBLE: Servers Overcrowding Disobedient Users in Anonymizing Networks
NYMBLE: Servers Overcrowding Disobedient Users in Anonymizing NetworksNYMBLE: Servers Overcrowding Disobedient Users in Anonymizing Networks
NYMBLE: Servers Overcrowding Disobedient Users in Anonymizing Networks
rahulmonikasharma
 
Nymble:Blocking misbehaving users in annoying networks(Link)
Nymble:Blocking misbehaving users in annoying networks(Link)Nymble:Blocking misbehaving users in annoying networks(Link)
Nymble:Blocking misbehaving users in annoying networks(Link)
Mysa Vijay
 
cybersecurity unit 5 basics of cybersecurity
cybersecurity unit 5 basics of cybersecuritycybersecurity unit 5 basics of cybersecurity
cybersecurity unit 5 basics of cybersecurity
JayaMishra170943
 
what is transport layer what are the typical attacks in transport l.pdf
what is transport layer what are the typical attacks in transport l.pdfwhat is transport layer what are the typical attacks in transport l.pdf
what is transport layer what are the typical attacks in transport l.pdf
brijeshagarwa329898l
 
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed BedewiBalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
Shah Sheikh
 
Mutual Authentication For Wireless Communication
Mutual Authentication For Wireless CommunicationMutual Authentication For Wireless Communication
Mutual Authentication For Wireless Communication
manish kumar
 
How Blockchain Can Improve Your Cyber Security
How Blockchain Can Improve Your Cyber Security How Blockchain Can Improve Your Cyber Security
How Blockchain Can Improve Your Cyber Security
Daniel Martin
 

Similar to blocking misbehaving users in anonymizing networks full ppt with screenshots -2nd review ! (20)

Blocking Misbehaving Users In Anonymizing Network(1st review)
Blocking Misbehaving Users In Anonymizing Network(1st review)Blocking Misbehaving Users In Anonymizing Network(1st review)
Blocking Misbehaving Users In Anonymizing Network(1st review)
 
C0951520
C0951520C0951520
C0951520
 
NYMBLE BLOCKING
NYMBLE BLOCKINGNYMBLE BLOCKING
NYMBLE BLOCKING
 
Nymble: Blocking Misbehaving Users In Anonymizing Networks
Nymble: Blocking Misbehaving Users In Anonymizing NetworksNymble: Blocking Misbehaving Users In Anonymizing Networks
Nymble: Blocking Misbehaving Users In Anonymizing Networks
 
A Novel Method for Blocking Misbehaving Users over Anonymizing Networks
A Novel Method for Blocking Misbehaving Users over Anonymizing NetworksA Novel Method for Blocking Misbehaving Users over Anonymizing Networks
A Novel Method for Blocking Misbehaving Users over Anonymizing Networks
 
If3614251429
If3614251429If3614251429
If3614251429
 
If3614251429
If3614251429If3614251429
If3614251429
 
Nymble blocking misbehaviouring users in anonymizing networks
Nymble blocking misbehaviouring users in anonymizing networksNymble blocking misbehaviouring users in anonymizing networks
Nymble blocking misbehaviouring users in anonymizing networks
 
Nymble blocking misbehaviouring users in anonymizing networks
Nymble blocking misbehaviouring users in anonymizing networksNymble blocking misbehaviouring users in anonymizing networks
Nymble blocking misbehaviouring users in anonymizing networks
 
Nymble blocking misbehaviouring users in anonymizing networks
Nymble blocking misbehaviouring users in anonymizing networksNymble blocking misbehaviouring users in anonymizing networks
Nymble blocking misbehaviouring users in anonymizing networks
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
341 345
341 345341 345
341 345
 
341 345
341 345341 345
341 345
 
NYMBLE: Servers Overcrowding Disobedient Users in Anonymizing Networks
NYMBLE: Servers Overcrowding Disobedient Users in Anonymizing NetworksNYMBLE: Servers Overcrowding Disobedient Users in Anonymizing Networks
NYMBLE: Servers Overcrowding Disobedient Users in Anonymizing Networks
 
Nymble:Blocking misbehaving users in annoying networks(Link)
Nymble:Blocking misbehaving users in annoying networks(Link)Nymble:Blocking misbehaving users in annoying networks(Link)
Nymble:Blocking misbehaving users in annoying networks(Link)
 
cybersecurity unit 5 basics of cybersecurity
cybersecurity unit 5 basics of cybersecuritycybersecurity unit 5 basics of cybersecurity
cybersecurity unit 5 basics of cybersecurity
 
what is transport layer what are the typical attacks in transport l.pdf
what is transport layer what are the typical attacks in transport l.pdfwhat is transport layer what are the typical attacks in transport l.pdf
what is transport layer what are the typical attacks in transport l.pdf
 
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed BedewiBalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
 
Mutual Authentication For Wireless Communication
Mutual Authentication For Wireless CommunicationMutual Authentication For Wireless Communication
Mutual Authentication For Wireless Communication
 
How Blockchain Can Improve Your Cyber Security
How Blockchain Can Improve Your Cyber Security How Blockchain Can Improve Your Cyber Security
How Blockchain Can Improve Your Cyber Security
 

Recently uploaded

Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
ssuser7dcef0
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 

Recently uploaded (20)

Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 

blocking misbehaving users in anonymizing networks full ppt with screenshots -2nd review !

  • 1. 2nd review By DINESH RAJA K ARAVINDHAN V
  • 2.  Anonymzing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client’s IP address from the server. The success of such networks, however, has been limited by users employing this anonymity for abusive purposes such as defacing popular Web sites. Web site administrators routinely rely on IP- address blocking for disabling access to misbehaving users, but blocking IP addresses is not practical if the abuser routes through an anonymizing network.
  • 3. As a result, administrators block all known exit nodes of anonymizing networks, denying anonymous access to misbehaving and behaving users alike. To address this problem, we present Nymble, a system in which servers can “blacklist” misbehaving users, thereby blocking users without compromising their anonymity. Our system is thus agnostic to different servers’ definitions of misbehavior—servers can blacklist users for whatever reason, and the privacy of blacklisted users is maintained. In future work we are processing admin report processing and prevention
  • 4.  Web site administrators cannot blacklist individual malicious users’ IP addresses, they blacklist the entire anonymizing network.  Traceable signatures allow the group manager to release a trapdoor all signatures generated by a particular user to be traced; such an approach does not provide the backward unlink ability  In existing process difficult to map more complex notions of misbehavior onto “double spending”
  • 5.  We present a secure system called Nymble, which provides all the following properties: anonymous authentication, backward unlinkability, subjective blacklisting, fast authentication speeds, rate- limited anonymous connections, revocation auditability (where users can verify whether they have been blacklisted), and also addresses the Sybil attack to make its deployment practical.
  • 6.  In Nymble, users acquire an ordered collection of nymbles, a special type of pseudonym, to connect toWebsites. Without additional information, these nymbles are computationally hard to link,4 and hence, using the stream of nymbles simulates anonymous access to services. Web sites, however, can blacklist users by obtaining a seed for a particular nymble, allowing them to link future nymbles from the same user—those used before the complaints remain unlinkable.
  • 7.  Servers can therefore blacklist anonymous users without knowledge of their IP addresses while allowing behaving users to connect anonymously
  • 8. 1. Resource-Based Blocking 2. The Pseudonym Manager 3. The Nymble Manager
  • 9.  To limit the number of identities a user can obtain, the Nymble system binds nymbles to resources that are sufficiently difficult to obtain in great numbers. Blacklisting anonymous users: We provide a means by which servers can blacklist users of an anonymizing network while maintaining their privacy.
  • 10.  The user must first contact the Pseudonym Manager (PM) and demonstrate control over a resource; for IP- address blocking, the user must connect to the PM directly (i.e., not through a known anonym zing network), We assume the PM has knowledge about Tor routers, for example, and can ensure that users are communicating with it directly. Pseudonyms are deterministically chosen based on the controlled resource, ensuring that the same pseudonym is always issued for the same resource.
  • 11.  After obtaining a pseudonym from the PM, the user connects to the Nymble Manager (NM) through the anonymizing network, and requests nymbles for access to a particular server (such as Wikipedia). A user’s requests to the NM are therefore pseudonymous, and nymbles are generated using the user’s pseudonym and the server’s identity. These nymbles are thus specific to a particular user-server pair. Nevertheless, as long as the PM and the NM do not collude, the Nymble system cannot identify which user is connecting to what server; the NM knows only the pseudonym-server pair, and the PM knows only the user identity-pseudonym
  • 12. The hardware used for the development of the project is:  PROCESSOR : PENTIUM III 766 MHz  RAM : 128 MD SD RAM  MONITOR : 15” COLOR  HARD DISK : 20 GB  FLOPPY DRIVE : 1.44 MB  CDDRIVE : LG 52X  KEYBOARD : STANDARD 102 KEYS  MOUSE : 3 BUTTONS
  • 13. The software used for the development of the project is:  OPERATING SYSTEM : Windows XP Professional  ENVIRONMENT : Visual Studio .NET 2008  .NET FRAMEWORK : Version 2.0  LANGUAGE : C#.NET  WEB SERVER : Internet Information Server 5.0  BACK END : Sql server 2005
  • 14.