Top Banner
Presented By: K.DINESH RAJA (1081120038) V.ARAVINDHAN (1081120001)
18
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Blocking misbehaving users in anonymizing network-project ppt*

Presented By: K.DINESH RAJA (1081120038)

V.ARAVINDHAN (1081120001)

Page 2: Blocking misbehaving users in anonymizing network-project ppt*

OUTLINE

• Problem statement

• Goals

• Objectives

• Existing system

• Proposed system

• How it works?

• Hardware Specification

• Software Specification

• Advantages

• Disadvantages

• Conclusion

• Reference OUTLINE

Page 3: Blocking misbehaving users in anonymizing network-project ppt*

1.Misuse of Anonymizing Network

•Defacing the websites

•Loading traffic in the network

2. Blocking entire network by the administrator due to

misbehaviors:

•Problem to the behaving users(a few “bad apples” can spoil

the fun for all ) Problem Statement

Page 4: Blocking misbehaving users in anonymizing network-project ppt*

1.Develop secure system that blocks

the misbehaving users and blacklist

them.

2.To achieve rate-limiting.

3.Get the user authenticated

successfully.

GOALS:

Page 5: Blocking misbehaving users in anonymizing network-project ppt*

1.Anonymous authentication

2.Subjective blacklisting

3.Fast authentication speeds

Objectives

Page 6: Blocking misbehaving users in anonymizing network-project ppt*

1. Pseudonymous credential

systems

2. Anonymous credential

systems

3. Subjective blacklisting

Page 7: Blocking misbehaving users in anonymizing network-project ppt*

Proposed system :1.Proposed solutions called Nymble, users acquire an ordered collection of nymbles , a special type of pseudonym, to connect to Websites.

2.Servers can therefore blacklist anonymous users without knowledge of their IP addresses while allowing behaving users to connect anonymously..

3.Proposed system ensures that users are aware of their blacklist status before they present a nymble , and disconnect immediately if they are blacklisted.

Page 8: Blocking misbehaving users in anonymizing network-project ppt*

How it works?

ARCHITECTURE DIAGRAM

Page 9: Blocking misbehaving users in anonymizing network-project ppt*

PROCESSOR : PENTIUM IV 2.6 GHz

RAM : 512 MB DD RAM

MONITOR : 15” COLOR

HARD DISK : 20 GB

FLOPPY DRIVE : 1.44 MB

CDDRIVE : LG 52X

KEYBOARD : STANDARD 102 KEYS

MOUSE : 3 BUTTONS

Hardware Requirements:

Page 10: Blocking misbehaving users in anonymizing network-project ppt*

Front End : Java, RMI, JFC (Swing)

Server : apache-tomcat

6.0.18(Web Server)

Backend : Ms-Access

Tools Used : Eclipse 3.3

Operating System : Windows XP/7

Software Requirements:

Page 11: Blocking misbehaving users in anonymizing network-project ppt*

Advantages:

1. Blacklisting anonymous users

2. Practical performance

3. Open source implementation

Page 12: Blocking misbehaving users in anonymizing network-project ppt*

1. Pseudonymity weakens the anonymity

provided by the anonymizing network.

2. Anonymous credential system does not

provide the backward unlinkability.

3. Subjective blacklisting works for only narrow

definitions of misbehavior. Disadvantages

Disadvantages:

Page 13: Blocking misbehaving users in anonymizing network-project ppt*

• We have proposed and built a

comprehensive credential system called

Nymble, which can be used to add a layer

of accountability to any publicly known

anonymizing network. Servers can blacklist

misbehaving users while maintaining their

privacy, and we show how these properties

can be attained in a way that is practical,

efficient, and sensitive to needs of both

users and services.

Conclusion:

Page 14: Blocking misbehaving users in anonymizing network-project ppt*

• We hope that our work will increase the

mainstream acceptance of anonymizing

networks such as Tor, which has thus far

been completely blocked by several

services because of users who abuse their

anonymity.

Page 15: Blocking misbehaving users in anonymizing network-project ppt*

1.Pdf Nymble Blocking Misbehaving Users

in Anonymizing Network Reference-

www.cs.dartmouth.edu/reports/TR2008-

637.com

2. Ppt Reference-

www.projects9.com/jieee.html

References:

Page 16: Blocking misbehaving users in anonymizing network-project ppt*

3.Pdf M. Bellare , A. Desai, E. Jokipii , and

P. Rogaway . A Concrete Security

Treatment of Symmetric Encryption.

Page 17: Blocking misbehaving users in anonymizing network-project ppt*
Page 18: Blocking misbehaving users in anonymizing network-project ppt*

ANY QUESTIONS ??