NYMBLE: BLOCKING ANONYMOUS IP ADDRESS IN ANONYMIZING NETWORKS release_5nl2pwzk3fbdpcwxdi2u5mffgu

by D Rao, J Paulson

Released as a article-journal .

2014   Volume 02, Issue 12

Abstract

The current method was presented for misbehaving user on blocked in the Tor networks called as Nymble. though the first restriction which we recognized for Nymble is that if the Nymble manager fails, then entire security system is fails second restriction is blocking IP address is not possible because if we reconnect it we get new IP address by dynamic property IP addressing. Problem of existing system can be overcome by our proposed system i.e. "Project Title". Anonymizing networks on Message Authentication code (MAC) address is used for blocking misbehaving users. We face MAC address as user identity, as dynamically generated by IP address, to solve above problem As it is not useful, we use MAC address, Sybil attack it support of there is no chance, as physical address it can't be change at any cost in MAC address. As presented system is nymble manager, in to totally centralized, to overcome above all disadvantage, where second manager may handle work of first nymble manager failure, use reliable system current system has scalability possessions as well as it can handle multiple server requests at a time. Blacklist users for anything reasons an organization is therefore disbeliever to different servers' definitions of misbehavior servers and the make available security of blacklisted users is preserving. We use strongly cryptography algorithm it is hard to break protection of our system.
In text/plain format

Archived Files and Locations

application/pdf  294.1 kB
file_rgqetd3sabce5n3pdvqz5ui3k4
web.archive.org (webarchive)
www.ijates.com (web)
Read Archived PDF
Preserved and Accessible
Type  article-journal
Stage   unknown
Year   2014
Work Entity
access all versions, variants, and formats of this works (eg, pre-prints)
Catalog Record
Revision: 5f9dd9c2-1c88-400d-9c23-2401ddcf665d
API URL: JSON