Misbehaving Users in Anonym Zing Network

نویسندگان

  • T. Shanmugapriya
  • C. Magesh Kumar
  • S. P. Kavya
  • M. Nandhini
چکیده

Anonymizing network provides web services to the users and also hide the client’s IP address from the server. All data is wrapped with several layer of encryption. The success of this network, hackers can easily deface popular web site. If the users misbehave, blocking particular IP addresses is difficult. Nymble system is a credential system in which servers can blacklist misbehaving users in anonymizing networks, without compromising their anonymity. This system could block the IP address. However it is possible for a user to attack from another IP. To limit the number of credentials obtained by a single individual by raising the cost of acquiring credentials, we include client puzzles as a resource for obtaining credential where users are required to perform a certain amount of computation. This paper utilizes game theory to propose a number of puzzle-based defenses against flooding attacks. KEYWORDSGame Theory, Nymble, Privacy.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Tracing Misbehaving Users by Utilizing Ticket-Based Protocols by Trusted Third Party in Anonymizing Networks

–Anonymizing networks provides network services to users without specific identity. Network administrator cannot identify user actions in anonymizing networks. Anonymizing networks such as The Onion Routing Networks (TOR) uses a layer structured encrypted message and series of routers each with a key to decrypt and forward the message. Which hide’s the client’s IP address from the server. The l...

متن کامل

Filtration model for the detection of malicious traffic in large-scale networks

This study proposes a capable, scalable, and reliable edge-to-edge model for filtering malicious traffic through real-time monitoring of the impact of user behavior on quality of service (QoS) regulations. The model investigates user traffic, including that injected through distributed gateways and that destined to gateways that are experiencing actual attacks. Misbehaving traffic filtration is...

متن کامل

Achieving Anonymity and Traceability in Wireless Networks

Anonymity provides protection for users to enjoy network services without being traced. While anonymity-related issues have been extensively studied in payment-based systems such as e-cash and peer-to-peer systems, little effort has been devoted to wireless mesh networks (WMNs). On the other hand, the network authority requires conditional anonymity such that misbehaving entities in the network...

متن کامل

Detection And Prevention of Misbehaving Users in Anonymizing Networks

As we studied in our literature, the recent method was presented for blocking of misbehaving user in the Tor networks called as Nymble. However the first limitation which we identified for Nymble is that if the Nymble manager fails, then whole security system is fails second limitation is blocking IP address is not feasible because if we reconnect it we get new IP address by dynamic property IP...

متن کامل

A Ticket Based Architecture for Providing Anonymity and Traceability in Wireless Mesh Network

A wireless mesh is a communication network made up of radio nodes organized in a mesh topology. A wireless mesh network help users to stay online anywhere, anytime for an unlimited time and it provide high security.In this paper we come across two issues one is anonymity and other is traceability. Anonymity provides protection for users to enjoy network services without being traced. Now a day’...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013