Upload
dinesh-krishna
View
154
Download
11
Tags:
Embed Size (px)
Citation preview
OUTLINE
• Problem statement
• Goals
• Objectives
• Existing system
• Proposed system
• How it works?
• Hardware Specification
• Software Specification
• Advantages
• Disadvantages
• Conclusion
• Reference OUTLINE
1.Misuse of Anonymizing Network
•Defacing the websites
•Loading traffic in the network
2. Blocking entire network by the administrator due to
misbehaviors:
•Problem to the behaving users(a few “bad apples” can spoil
the fun for all ) Problem Statement
1.Develop secure system that blocks
the misbehaving users and blacklist
them.
2.To achieve rate-limiting.
3.Get the user authenticated
successfully.
GOALS:
Proposed system :1.Proposed solutions called Nymble, users acquire an ordered collection of nymbles , a special type of pseudonym, to connect to Websites.
2.Servers can therefore blacklist anonymous users without knowledge of their IP addresses while allowing behaving users to connect anonymously..
3.Proposed system ensures that users are aware of their blacklist status before they present a nymble , and disconnect immediately if they are blacklisted.
PROCESSOR : PENTIUM IV 2.6 GHz
RAM : 512 MB DD RAM
MONITOR : 15” COLOR
HARD DISK : 20 GB
FLOPPY DRIVE : 1.44 MB
CDDRIVE : LG 52X
KEYBOARD : STANDARD 102 KEYS
MOUSE : 3 BUTTONS
Hardware Requirements:
Front End : Java, RMI, JFC (Swing)
Server : apache-tomcat
6.0.18(Web Server)
Backend : Ms-Access
Tools Used : Eclipse 3.3
Operating System : Windows XP/7
Software Requirements:
1. Pseudonymity weakens the anonymity
provided by the anonymizing network.
2. Anonymous credential system does not
provide the backward unlinkability.
3. Subjective blacklisting works for only narrow
definitions of misbehavior. Disadvantages
Disadvantages:
• We have proposed and built a
comprehensive credential system called
Nymble, which can be used to add a layer
of accountability to any publicly known
anonymizing network. Servers can blacklist
misbehaving users while maintaining their
privacy, and we show how these properties
can be attained in a way that is practical,
efficient, and sensitive to needs of both
users and services.
Conclusion:
• We hope that our work will increase the
mainstream acceptance of anonymizing
networks such as Tor, which has thus far
been completely blocked by several
services because of users who abuse their
anonymity.
1.Pdf Nymble Blocking Misbehaving Users
in Anonymizing Network Reference-
www.cs.dartmouth.edu/reports/TR2008-
637.com
2. Ppt Reference-
www.projects9.com/jieee.html
References:
3.Pdf M. Bellare , A. Desai, E. Jokipii , and
P. Rogaway . A Concrete Security
Treatment of Symmetric Encryption.