Nymble: Blocking Misbehaving Users In Anonymizing Networks
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
The advent of anonymizing networks assured that users could access internet services with complete privacy avoiding any possible hindrance. This arrangement where series of routers form a network, hide the user’s IP address from the server. However malfeasance of few malpractitioners has left this system with a loophole where users make use of this anonymity to deface popular websites. Administrators who cannot practically block a user using IP address are forced to shut all possible nodes that lead to exit. Thus deny access to both behaving and non-behavingusers altogether. And so end up blocking users with no compromise to their anonymity. Hence we propose a system which is undogmatic with different servers. Thus we aim at giving the administrator the right to block the malicious user without hindering the anonymity of the rest.
Authors and Affiliations
Prof. Vina Lomte
Classification of Cardiovascular Disease from ECG using Artificial Neural Network and Hidden Markov Model.
Abstract: this paper deals with the classification of cardiovascular disease for its future analysis. If future progression of the disease can be predicted earlier with proper change in medication patients treatmen...
Performance Analysis of Conventional Diversity Combining Schemes in Rayleigh and Rician Fading Channels
Abstract: Diversity is the powerful technique used in wireless communication system to improve the performance over a fading radio channel [1] [2]. Here receiver is provided with multiple copies of the same infor...
The Improved Image Encryption-Compression System for Error Clustering and Random Permutation
Abstract: Image encryption must be led before image pressure. In this paper we concentrate how to plan a couple of image encryption and pressure calculations such that packing encoded images can at present be proficientl...
Documentaries use for the design of learning activities
Documentaries used in the training field constitute the rich sources of information. They have the advantage to associate the elements of knowledge with events which request the episodic memory of the learn...
Secure Image Hiding Algorithm using Cryptography and Steganography
In the present scenario, any communication of internet and networks application requires security.Lots of data security and data hiding algorithms have been developed in the last decade.Cryptography and ste...