0% found this document useful (0 votes)
72 views

Nymble: Blocking Misbehaving Users in Anonymizing Networks

This document summarizes Nymble, a system that allows servers to blacklist misbehaving anonymous users on anonymizing networks like Tor without compromising their anonymity. It works by having users acquire an ordered collection of nymbles (special pseudonyms) to connect to websites. While nymbles appear unlinkable, websites can blacklist users by obtaining a seed to link a user's nymbles. This allows blacklisting of misbehaving anonymous users while allowing behaving users anonymous access.

Uploaded by

Wasif Anwar
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
72 views

Nymble: Blocking Misbehaving Users in Anonymizing Networks

This document summarizes Nymble, a system that allows servers to blacklist misbehaving anonymous users on anonymizing networks like Tor without compromising their anonymity. It works by having users acquire an ordered collection of nymbles (special pseudonyms) to connect to websites. While nymbles appear unlinkable, websites can blacklist users by obtaining a seed to link a user's nymbles. This allows blacklisting of misbehaving anonymous users while allowing behaving users anonymous access.

Uploaded by

Wasif Anwar
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 3

Nymble: Blocking Misbehaving Users in Anonymizing Networks

ABSTRACT
INTRODUCTION:
Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the clients IP address from the server. The success of such networks, however, has been limited by users employing this anonymity for abusive purposes such as defacing popular websites. Website administrators routinely rely on IP-address blocking for disabling access to misbehaving users, but blocking IP addresses is not practical if the abuser routes through an anonymizing network. As a result, administrators block all known exit nodes of anonymizing networks, denying anonymous access to misbehaving and behaving users alike. To address this problem, we present Nymble, a system in which servers can blacklist misbehaving users, thereby blocking users without compromising their anonymity. Our system is thus agnostic to different servers definitions of misbehavior servers can blacklist users for whatever reason, and the privacy of blacklisted users is maintained.

EXISTING SYSTEM:
Anonymizing networks such as Tor route traffic through independent nodes in separate administrative domains to hide a clients IP address. Unfortunately, some users have misused such networks under the cover of anonymity; users have repeatedly defaced popular websites such as Wikipedia. Since website administrators cannot blacklist individual malicious users IP addresses, they blacklist the entire anonymizing network. Such measures eliminate malicious activity through anonymizing networks at the cost of denying anonymous access to behaving users. In other words, a few bad apples can spoil the fun for all. (This has happened repeatedly with Tor. There are several solutions to this problem, each providing some degree of accountability. In pseudonymous

credential systems, users log into websites using pseudonyms, which can be added to a blacklist if a user misbehaves. Unfortunately, this approach results in pseudonymity for all users, and weakens the anonymity provided by the anonymizing network.

PROPOSED SYSTEM:
We present a secure system called Nymble. In Nymble, users acquire an ordered collection of nymbles, a special type of pseudonym, to connect to websites. Without additional information, these nymbles are computationally hard to link, and hence using the stream of nymbles simulates anonymous access to services. Websites, however, can blacklist users by obtaining a seed for a particular nymble, allowing them to link future nymbles from the same user those used before the complaints remain unlinkable. Servers can therefore blacklist anonymous users without knowledge of their IP addresses while allowing behaving users to connect anonymously. Our system ensures that users are aware of their blacklist status before they present a nymble, and disconnect immediately if they are blacklisted. Although our work applies to anonymizing networks in general, we consider Tor for purposes of exposition. In fact, any number of anonymizing networks can rely on the same Nymble system, blacklisting anonymous users regardless of their anonymizing network(s) of choice.

Advantages:

Anonymous authentication Backward unlink ability Subjective blacklisting Fast authentication speeds Rate-limited anonymous connections

Revocation auditability (where users can verify Whether they have been blacklisted)

MODULES:
There are totally 6 modules in this project

Register Module

Login Module

Pseudonym Manager Module Nymble Manager Module Chatting Module

Blocking Module

SOFTWARE REQUIREMENTS:
Operating System

:Windows xp/vista/7 : JDK 1.6 : HTML, JSP, Swing : Apache Tomcat(Any Version) : MySql

Technology
Front End

Server
Database

HARDWARE REQUIREMENTS:

Processor RAM

: Any Processor above 500 MHz : 512 MB : 10 GB : Standard Keyboard & Mouse : VGA & High Resolution Monitor

Hard Disk Input Device Output Device

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy