Nymble: Blocking Misbehaving Users In Anonymizing Networks
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
The advent of anonymizing networks assured that users could access internet services with complete privacy avoiding any possible hindrance. This arrangement where series of routers form a network, hide the user’s IP address from the server. However malfeasance of few malpractitioners has left this system with a loophole where users make use of this anonymity to deface popular websites. Administrators who cannot practically block a user using IP address are forced to shut all possible nodes that lead to exit. Thus deny access to both behaving and non-behavingusers altogether. And so end up blocking users with no compromise to their anonymity. Hence we propose a system which is undogmatic with different servers. Thus we aim at giving the administrator the right to block the malicious user without hindering the anonymity of the rest.
Authors and Affiliations
Prof. Vina Lomte
A Quick Development Model for Change Oriented Software Process
Abstract: Changes are common for software process today and hence research is required for change-oriented software engineering. Increase in maintenance costs have become a major concern for developers and users of softw...
Connected Component Clustering Based Text Detection with Structure Based Partition and Grouping
Abstract: Extraction of text from natural scene images is a challenging problem because of its complex backgrounds and large variations of text patterns. In this paper, we presents an innovative scene text detection algo...
Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection against DDOS.
Abstract: Multiple-path routing protocols allow data source node to distribute the total traffic among available paths. We consider the problem of jamming-aware source routing in which the source node performs traf...
An Enhanced Authentication System Using Face and Fingerprint Technologies
Abstract: The primary aim of this paper is to develop an enhanced authentication system using a CascadedLink Feed-Forward Neural Networks. In the end, the system overcomes some limitations of face recognition and fingerp...
Cloud Computing: Overview & Utility
Abstract: Cloud computing enables the process of storing documents, files photos online instead of using homecomputer, or webmail or a social networking site. If in an organization, it is desired to use an online i...