TITLE

EXTENDED NYMBLE: METHOD FOR TRACKING MISBEHAVING USERS ANONYMOSLY WHILE BLOCKING

AUTHOR(S)
Durga Prasad, M.; Chenna Reddy, P.; Samya, Banoth
PUB. DATE
February 2013
SOURCE
International Journal of Computer Science & Information Technolo;Feb2013, Vol. 5 Issue 1, p87
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
We have many of anonymizing networks which provide users to access services of server anonymously. Anonymity has received increasing attention in the literature due to user awareness of their privacy. Nowadays, anonymity provides protection to users to enjoy network services without being traced. Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client's IP address from the server. . Web site administrators routinely rely on IPaddress blocking for disabling access to misbehaving users, but blocking IP addresses is not practical if the abuser routes through an anonymizing network. As a result, administrators block all known exit nodes of anonymizing networks, denying anonymous access to misbehaving and behaving users alike. To address this problem Nymble is developed, a system in which servers can "blacklist" misbehaving users. We present extensions to nymble framework for anonymizing blacklisting schemes. First, we provide a mechanism to nymble manager to track blacklisting of user in multiple linking windows while preserving anonymity of the users. Some users always look to misbehave with servers; there major intention is to make the server down. The problem with nymble is nymble manager blacklist a user for one likability window (i.e. 1 day), on the other day again he can misbehave with same server or other server. He can continue it as his everyday activity as Nymble manager doesn't have any mechanism to identify such type of users while preserving anonymity. To address this problem, we present a method which can identify such users, while preserving anonymity and nymble manager with identified information can decide upon how much time to blacklist a misbehaving user. We also suggest some algorithms which are changed in comparison to existing nymble.
ACCESSION #
86008168

 

Related Articles

  • Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud. Rahulamathavan, Yogachandran; Phan, Raphael C.-W.; Veluru, Suresh; Cumanan, Kanapathippillai; Rajarajan, Muttukrishnan // IEEE Transactions on Dependable & Secure Computing;Sep2014, Vol. 11 Issue 5, p467 

    Emerging cloud computing infrastructure replaces traditional outsourcing techniques and provides flexible services to clients at different locations via Internet. This leads to the requirement for data classification to be performed by potentially untrusted servers in the cloud. Within this...

  • A Secure and Anonymous Electronic Voting Scheme Based on Key Exchange Protocol. Chun-Ta Li; Min-Shiang Hwang // International Journal of Security & Its Applications;Jan2013, Vol. 7 Issue 1, p59 

    Voter anonymity and voting correctness are important issues for electronic voting mechanisms. Compared electronic voting with traditional 1elections, an electronic voter is able to cast his/her ballot through the Internet in any place and at any time if he/she can access the network. Therefore,...

  • The PSIA Releases Draft Proposal of Physical-Logical Access Interoperability Specification.  // SDM: Security Distributing & Marketing;May2014, Vol. 44 Issue 5, p142 

    The article reports on the release of the Physical Security Interoperability Association's (PSIA) Physical-Logical Access Interoperability (PLAI) specification draft proposal. PSIA executive director David Bunzel expresses his excitement on the potential impact of PLAI for reshaping logical and...

  • Old and Clunky? Time for IP Access. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Oct2015, Vol. 52 Issue 10, p38 

    The article offers information on the use of Internet Protocol (IP)-enabled solutions at various sectors in the U.S. According too Benny Brown of Calvary Chapel Fort Lauderdale, it is simple to scale with a bridge and a central server that is just a card reader and controller. Banking company...

  • Classifying Rules by In-out Traffic Direction to Avoid Security Policy Anomaly. Sunghyun Kim; Heejo Lee // KSII Transactions on Internet & Information Systems;Aug2010, Vol. 4 Issue 4, p671 

    The continuous growth of attacks in the Internet causes to generate a number of rules in security devices such as Intrusion Prevention Systems, firewalls, etc. Policy anomalies in security devices create security holes and prevent the system from determining quickly whether allow or deny a...

  • Use LDAP over SSL to Lock Down Active Directory Traffic. De Clercq, Jan // Windows IT Pro;Jan2012, Vol. 18 Issue 1, p29 

    The article focuses on Active Directory (AD) LDAP, which can be secured by using the Secure Sockets Layer/Transport Layer Security (SSL/TLS) protocols. LDAPS certificate is issued by a Certification Authority (CA) and trust is established by configuring clients and the server to trust the...

  • Sophos releases server protection solution.  // Express Computer;9/16/2013, Vol. 24 Issue 14, p47 

    The article discusses the release of the Sophos Server Protection server security software from Sophos.

  • Thin-Clients: A Replacement for Regular PCs in Highly Secure Environs. Maurya, Raj // PC Quest;Oct2015, p32 

    The article discusses different reasons for choosing a thin client for office, which are low-cost diskless computing devices and function as a virtual desktop, using the computing power residing on networked servers. Thin clients offer many advantages over regular personal computers (PCs) and...

  • 3Com Opts for Integrated Security. Nobel, Carmen // PC Week;01/18/99, Vol. 16 Issue 3, p15 

    Notes that 3Com Corp. plans to embed a data security chip from VLSI Technology Inc. onto its client/server networking products in early 1999. Security features of the chip including support for the Internet Protocol (IP) Security specification; Why Microsoft Windows 2000 will be necessary for...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics