18
Presented By: K.DINESH RAJA (1081120038) V.ARAVINDHAN (1081120001)

Blocking misbehaving users in anonymizing network-project ppt*

Embed Size (px)

Citation preview

Presented By: K.DINESH RAJA (1081120038)

V.ARAVINDHAN (1081120001)

OUTLINE

• Problem statement

• Goals

• Objectives

• Existing system

• Proposed system

• How it works?

• Hardware Specification

• Software Specification

• Advantages

• Disadvantages

• Conclusion

• Reference OUTLINE

1.Misuse of Anonymizing Network

•Defacing the websites

•Loading traffic in the network

2. Blocking entire network by the administrator due to

misbehaviors:

•Problem to the behaving users(a few “bad apples” can spoil

the fun for all ) Problem Statement

1.Develop secure system that blocks

the misbehaving users and blacklist

them.

2.To achieve rate-limiting.

3.Get the user authenticated

successfully.

GOALS:

1.Anonymous authentication

2.Subjective blacklisting

3.Fast authentication speeds

Objectives

1. Pseudonymous credential

systems

2. Anonymous credential

systems

3. Subjective blacklisting

Proposed system :1.Proposed solutions called Nymble, users acquire an ordered collection of nymbles , a special type of pseudonym, to connect to Websites.

2.Servers can therefore blacklist anonymous users without knowledge of their IP addresses while allowing behaving users to connect anonymously..

3.Proposed system ensures that users are aware of their blacklist status before they present a nymble , and disconnect immediately if they are blacklisted.

How it works?

ARCHITECTURE DIAGRAM

PROCESSOR : PENTIUM IV 2.6 GHz

RAM : 512 MB DD RAM

MONITOR : 15” COLOR

HARD DISK : 20 GB

FLOPPY DRIVE : 1.44 MB

CDDRIVE : LG 52X

KEYBOARD : STANDARD 102 KEYS

MOUSE : 3 BUTTONS

Hardware Requirements:

Front End : Java, RMI, JFC (Swing)

Server : apache-tomcat

6.0.18(Web Server)

Backend : Ms-Access

Tools Used : Eclipse 3.3

Operating System : Windows XP/7

Software Requirements:

Advantages:

1. Blacklisting anonymous users

2. Practical performance

3. Open source implementation

1. Pseudonymity weakens the anonymity

provided by the anonymizing network.

2. Anonymous credential system does not

provide the backward unlinkability.

3. Subjective blacklisting works for only narrow

definitions of misbehavior. Disadvantages

Disadvantages:

• We have proposed and built a

comprehensive credential system called

Nymble, which can be used to add a layer

of accountability to any publicly known

anonymizing network. Servers can blacklist

misbehaving users while maintaining their

privacy, and we show how these properties

can be attained in a way that is practical,

efficient, and sensitive to needs of both

users and services.

Conclusion:

• We hope that our work will increase the

mainstream acceptance of anonymizing

networks such as Tor, which has thus far

been completely blocked by several

services because of users who abuse their

anonymity.

1.Pdf Nymble Blocking Misbehaving Users

in Anonymizing Network Reference-

www.cs.dartmouth.edu/reports/TR2008-

637.com

2. Ppt Reference-

www.projects9.com/jieee.html

References:

3.Pdf M. Bellare , A. Desai, E. Jokipii , and

P. Rogaway . A Concrete Security

Treatment of Symmetric Encryption.

ANY QUESTIONS ??