Seminar

Post on 20-Mar-2017

21 views 0 download

transcript

Anonymizing Networks of Blocking Misbehaving Users

Presented By

A.Kalpana Kumari

ContentsAbstractProblem statementGoalsNymble systemHardware specificationSoftware specificationHow it worksAdvantages DisadvantagesConclusionReferences

Abstract Internet services can be accessed privately

through anonymizing networks like Tor to hide the client’s IP address from the server.

The users of such networks often indulge into malicious activities and cause damage to popular web applications.

Web site administrators block the IP-address from which the request comes.

This is not practical as the hackers operate through anonymous network.

The solution is to develop a security mechanism that only misbehaving users are blacklisted.

Problem statement:

Misuse of anonymizing network.

Blocking entire network by the administrator due to misbehaving users.

GOALS:

Develop secure system that block the misbehaving users and blacklist them.

Get the user authenticated successfully.

Nymble System:Nymble is a special type of pseudonym to connect websites.

servers can blacklist anonymous users without knowledge of their IP addresses while allowing valid users to connect anonymously.

Nymble system ensures that users are aware of their blacklist status before they present a nymble , and disconnect immediately if they are blacklisted.

HARDWARE SPECIFICATION:PROCESSOR             :          PENTIUM IV 2.6 GHzRAM                         :           512 MB DD RAMMONITOR                 :           15” COLORHARD DISK               :          20 GBFLOPPY DRIVE        :          1.44 MBCDDRIVE                   :          LG 52XKEYBOARD               :        STANDARD 102

KEYSMOUSE                     :          3 BUTTONS

SOFTWARE SPECIFICATION:Front End             :  Java, RMI, JFC (Swing)Server                     : apache-tomcat 6.0.18(Web

Server)Backend                  : Ms-AccessTools Used              :  Eclipse 3.3Operating System   : Windows XP/7

How it works?

Screen design :

Home

User Register:

Admin Login:

Admin Home:

Pseudonym Manager:

User Activation:

Access Process:

Nymble Manager:

View Misused User:

User login:

Process:

Web Page:

Advantages:Blacklisting anonymous users

Practical performance

Open source implementation

Disadvantages:Pseudonymity weakens the anonymity

provided by the network.

Subjective blacklisting works for only narrow definitions of misbehavior.

Conclusion:Nymble is a credential system which can be

used to add a layer to any known anonymizing network.

Servers can blacklist misbehaving users while maintaining their privacy.

References: 1. J. Camenisch and A. Lysyanskaya, “An Efficient System for Non-Transferable Anonymous Credentials with Optional AnonymityRevocation,” Proc. Int’l Conf. Theory and Application of CryptographicTechniques (EUROCRYPT), Springer, pp. 93-118, 2001

2. Pdf M. Bellare , A. Desai, E. Jokipii , and P. Rogaway . A Concrete Security Treatment of Symmetric Encryption.

THANK YOU

Any questions