SlideShare una empresa de Scribd logo
1 de 18
1
 Introduction
 Nymble
 Properties
 System Architecture
 Security Model
 Limitations
 Conclusion

                 Nymble Blocking System   3
   Anonymous network
      o IP hiding facilities
      o Polipo, Tor, USAIP
 Users misuses this network for abuse
 They deface popular websites
 Websites cannot blacklist individual IP
  address
 They blacklist entire anonymizing network



                    Nymble Blocking System   4
 In   pseudonymous credential systems
       Users are added to a blacklist
       Weak in anonymity

 In   anonymous credential system
       Group signatures
       Lacks scalability



                  Nymble Blocking System   5
 A system that allows websites to selectively
  blacklist users of anonymizing networks.
 Blocks user without user's IP-address.
 Legitimate users enjoy anonymity.
 Blacklisted users got blocked for future
  connections.
 Previous connections remain unlinkable.



               Nymble Blocking System      6
 Anonymous Authentication


 Backward     Unlinkability

 Subjective   Blacklisting


               Nymble Blocking System   7
 Fast Authentication                 Speeds

 Rate-Limited Anonymous                   Connections

 Revocation Auditability



             Nymble Blocking System                8
   User

   The Pseudonym Manager

   The Nymble Manager

   Server

             Nymble Blocking System   9
Fig. The Nymble system architecture showing the various modes of interaction

                       Nymble Blocking System                                  10
Fig: The Nymble system architecture showing how a user is blacklisted
                     Nymble Blocking System                             11
Nymble Blocking System   12
Aims four security goals


 Blacklistability

 Rate-limiting assures

 Nonframeability

 Anonymity

               Nymble Blocking System   13
 Sybil attack
 Mimics IP based blocking
 Availability of multiple IP address helps
  users circumvent the system




             Nymble Blocking System   14
 Nymble is comprehensive credential system.
 Add a layer of accountability to any publicly known
  anonymizing network.
 Servers blacklist misbehaving users maintaining their
  privacy.
 Increase the mainstream acceptance of anonymizing
  network.




                 Nymble Blocking System         15
 www.airccse.org
 www.torproject.org
 www.sciencedirect.com
 www.wikipedia.com




              Nymble Blocking System
                                       16
Nymble Blocking System
                         17
Nymble: Blocking System

Más contenido relacionado

La actualidad más candente

Network Security
Network SecurityNetwork Security
Network SecurityJaya sudha
 
Network security
Network securityNetwork security
Network securityAli Kamil
 
a famework for analyzing template security and privacy in biometric authenti...
 a famework for analyzing template security and privacy in biometric authenti... a famework for analyzing template security and privacy in biometric authenti...
a famework for analyzing template security and privacy in biometric authenti...ZTech Proje
 
UNIT IV:Security Measurement Strategies
UNIT IV:Security Measurement StrategiesUNIT IV:Security Measurement Strategies
UNIT IV:Security Measurement StrategiesArnav Chowdhury
 
Xss.e xopresentation from eXo SEA
Xss.e xopresentation from eXo SEAXss.e xopresentation from eXo SEA
Xss.e xopresentation from eXo SEAThuy_Dang
 
message passing interface
message passing interfacemessage passing interface
message passing interfaceZTech Proje
 
Network management and security
Network management and securityNetwork management and security
Network management and securityAnkit Bhandari
 
Dark Alleys Part2
Dark Alleys Part2Dark Alleys Part2
Dark Alleys Part2Anne Adrian
 
02 introduction to network security
02 introduction to network security02 introduction to network security
02 introduction to network securityJoe McCarthy
 
Presentation network security
Presentation network securityPresentation network security
Presentation network securitycegonsoft1999
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Securitycrussell79
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityShitiz Upreti
 

La actualidad más candente (20)

Network security
Network security Network security
Network security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network security
Network securityNetwork security
Network security
 
Unit6
Unit6Unit6
Unit6
 
a famework for analyzing template security and privacy in biometric authenti...
 a famework for analyzing template security and privacy in biometric authenti... a famework for analyzing template security and privacy in biometric authenti...
a famework for analyzing template security and privacy in biometric authenti...
 
Web server security challenges
Web server security challengesWeb server security challenges
Web server security challenges
 
UNIT IV:Security Measurement Strategies
UNIT IV:Security Measurement StrategiesUNIT IV:Security Measurement Strategies
UNIT IV:Security Measurement Strategies
 
Xss.e xopresentation from eXo SEA
Xss.e xopresentation from eXo SEAXss.e xopresentation from eXo SEA
Xss.e xopresentation from eXo SEA
 
message passing interface
message passing interfacemessage passing interface
message passing interface
 
Network management and security
Network management and securityNetwork management and security
Network management and security
 
Network security
Network securityNetwork security
Network security
 
Dark Alleys Part2
Dark Alleys Part2Dark Alleys Part2
Dark Alleys Part2
 
Moodle security
Moodle securityMoodle security
Moodle security
 
Network Security
Network Security Network Security
Network Security
 
02 introduction to network security
02 introduction to network security02 introduction to network security
02 introduction to network security
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
 
XST
XSTXST
XST
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Security
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 

Destacado

Network and network security
Network and network securityNetwork and network security
Network and network securityRuchi Gupta
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securityNagendra Um
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)Prafull Johri
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 
Securing your cloud with Xen's advanced security features
Securing your cloud with Xen's advanced security featuresSecuring your cloud with Xen's advanced security features
Securing your cloud with Xen's advanced security featuresThe Linux Foundation
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cftoamma
 
Contaminacion del aire y de las aguas
Contaminacion del aire y de las aguas Contaminacion del aire y de las aguas
Contaminacion del aire y de las aguas Jorge Salazar
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applicationswebhostingguy
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptographypinkutinku26
 
Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/ Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/ Tania Agni
 
Rashed al kamdah network security threats
Rashed al kamdah network security threatsRashed al kamdah network security threats
Rashed al kamdah network security threatsrashidalkamdah
 
Cryptography and network security
 Cryptography and network security Cryptography and network security
Cryptography and network securityMahipesh Satija
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptographyPavithra renu
 
Network security - Basic concepts
Network security - Basic conceptsNetwork security - Basic concepts
Network security - Basic conceptsKhoa Nguyen
 

Destacado (20)

Network and network security
Network and network securityNetwork and network security
Network and network security
 
Pgp smime
Pgp smimePgp smime
Pgp smime
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Email Security Overview
Email Security OverviewEmail Security Overview
Email Security Overview
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Securing your cloud with Xen's advanced security features
Securing your cloud with Xen's advanced security featuresSecuring your cloud with Xen's advanced security features
Securing your cloud with Xen's advanced security features
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
 
Contaminacion del aire y de las aguas
Contaminacion del aire y de las aguas Contaminacion del aire y de las aguas
Contaminacion del aire y de las aguas
 
Basic Network Security_Primer
Basic Network Security_PrimerBasic Network Security_Primer
Basic Network Security_Primer
 
Party pronto pres new
Party pronto pres newParty pronto pres new
Party pronto pres new
 
E securty
E securtyE securty
E securty
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applications
 
Networksecurity&cryptography
Networksecurity&cryptographyNetworksecurity&cryptography
Networksecurity&cryptography
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/ Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/
 
Rashed al kamdah network security threats
Rashed al kamdah network security threatsRashed al kamdah network security threats
Rashed al kamdah network security threats
 
Cryptography and network security
 Cryptography and network security Cryptography and network security
Cryptography and network security
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
 
Network security - Basic concepts
Network security - Basic conceptsNetwork security - Basic concepts
Network security - Basic concepts
 

Similar a Nymble: Blocking System

Nymble blocking misbehaviouring users in anonymizing networks
Nymble blocking misbehaviouring users in anonymizing networksNymble blocking misbehaviouring users in anonymizing networks
Nymble blocking misbehaviouring users in anonymizing networksMuthu Samy
 
Nymble blocking misbehaviouring users in anonymizing networks
Nymble blocking misbehaviouring users in anonymizing networksNymble blocking misbehaviouring users in anonymizing networks
Nymble blocking misbehaviouring users in anonymizing networksMuthu Samy
 
Nymble blocking misbehaviouring users in anonymizing networks
Nymble blocking misbehaviouring users in anonymizing networksNymble blocking misbehaviouring users in anonymizing networks
Nymble blocking misbehaviouring users in anonymizing networksMuthu Samy
 
S.A.kalaiselvan blocking misbehaving users in anonymizing
S.A.kalaiselvan blocking misbehaving users in anonymizingS.A.kalaiselvan blocking misbehaving users in anonymizing
S.A.kalaiselvan blocking misbehaving users in anonymizingkalaiselvanresearch
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
The Road Network security
The Road Network securityThe Road Network security
The Road Network securityKhaled Omar
 
A Novel Method for Blocking Misbehaving Users over Anonymizing Networks
A Novel Method for Blocking Misbehaving Users over Anonymizing NetworksA Novel Method for Blocking Misbehaving Users over Anonymizing Networks
A Novel Method for Blocking Misbehaving Users over Anonymizing NetworksIJMER
 
Formative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering AttacksFormative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering AttacksDamaineFranklinMScBE
 
NYMBLE: Servers Overcrowding Disobedient Users in Anonymizing Networks
NYMBLE: Servers Overcrowding Disobedient Users in Anonymizing NetworksNYMBLE: Servers Overcrowding Disobedient Users in Anonymizing Networks
NYMBLE: Servers Overcrowding Disobedient Users in Anonymizing Networksrahulmonikasharma
 
Expressive Privacy Control With Pseudonyms
Expressive Privacy Control With PseudonymsExpressive Privacy Control With Pseudonyms
Expressive Privacy Control With PseudonymsSeungyeop Han
 
Lecture26 cc-security1
Lecture26 cc-security1Lecture26 cc-security1
Lecture26 cc-security1Ankit Gupta
 

Similar a Nymble: Blocking System (20)

C0951520
C0951520C0951520
C0951520
 
Nymble blocking misbehaviouring users in anonymizing networks
Nymble blocking misbehaviouring users in anonymizing networksNymble blocking misbehaviouring users in anonymizing networks
Nymble blocking misbehaviouring users in anonymizing networks
 
Nymble blocking misbehaviouring users in anonymizing networks
Nymble blocking misbehaviouring users in anonymizing networksNymble blocking misbehaviouring users in anonymizing networks
Nymble blocking misbehaviouring users in anonymizing networks
 
Nymble blocking misbehaviouring users in anonymizing networks
Nymble blocking misbehaviouring users in anonymizing networksNymble blocking misbehaviouring users in anonymizing networks
Nymble blocking misbehaviouring users in anonymizing networks
 
S.A.kalaiselvan blocking misbehaving users in anonymizing
S.A.kalaiselvan blocking misbehaving users in anonymizingS.A.kalaiselvan blocking misbehaving users in anonymizing
S.A.kalaiselvan blocking misbehaving users in anonymizing
 
If3614251429
If3614251429If3614251429
If3614251429
 
If3614251429
If3614251429If3614251429
If3614251429
 
Thesis
ThesisThesis
Thesis
 
NYMBLE BLOCKING
NYMBLE BLOCKINGNYMBLE BLOCKING
NYMBLE BLOCKING
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
The Road Network security
The Road Network securityThe Road Network security
The Road Network security
 
341 345
341 345341 345
341 345
 
341 345
341 345341 345
341 345
 
A Novel Method for Blocking Misbehaving Users over Anonymizing Networks
A Novel Method for Blocking Misbehaving Users over Anonymizing NetworksA Novel Method for Blocking Misbehaving Users over Anonymizing Networks
A Novel Method for Blocking Misbehaving Users over Anonymizing Networks
 
Formative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering AttacksFormative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering Attacks
 
NYMBLE: Servers Overcrowding Disobedient Users in Anonymizing Networks
NYMBLE: Servers Overcrowding Disobedient Users in Anonymizing NetworksNYMBLE: Servers Overcrowding Disobedient Users in Anonymizing Networks
NYMBLE: Servers Overcrowding Disobedient Users in Anonymizing Networks
 
Expressive Privacy Control With Pseudonyms
Expressive Privacy Control With PseudonymsExpressive Privacy Control With Pseudonyms
Expressive Privacy Control With Pseudonyms
 
Lecture26 cc-security1
Lecture26 cc-security1Lecture26 cc-security1
Lecture26 cc-security1
 
Linta
LintaLinta
Linta
 
Linta
LintaLinta
Linta
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Nymble: Blocking System

  • 1. 1
  • 2.
  • 3.  Introduction  Nymble  Properties  System Architecture  Security Model  Limitations  Conclusion Nymble Blocking System 3
  • 4. Anonymous network o IP hiding facilities o Polipo, Tor, USAIP  Users misuses this network for abuse  They deface popular websites  Websites cannot blacklist individual IP address  They blacklist entire anonymizing network Nymble Blocking System 4
  • 5.  In pseudonymous credential systems Users are added to a blacklist Weak in anonymity  In anonymous credential system Group signatures Lacks scalability Nymble Blocking System 5
  • 6.  A system that allows websites to selectively blacklist users of anonymizing networks.  Blocks user without user's IP-address.  Legitimate users enjoy anonymity.  Blacklisted users got blocked for future connections.  Previous connections remain unlinkable. Nymble Blocking System 6
  • 7.  Anonymous Authentication  Backward Unlinkability  Subjective Blacklisting Nymble Blocking System 7
  • 8.  Fast Authentication Speeds  Rate-Limited Anonymous Connections  Revocation Auditability Nymble Blocking System 8
  • 9. User  The Pseudonym Manager  The Nymble Manager  Server Nymble Blocking System 9
  • 10. Fig. The Nymble system architecture showing the various modes of interaction Nymble Blocking System 10
  • 11. Fig: The Nymble system architecture showing how a user is blacklisted Nymble Blocking System 11
  • 13. Aims four security goals  Blacklistability  Rate-limiting assures  Nonframeability  Anonymity Nymble Blocking System 13
  • 14.  Sybil attack  Mimics IP based blocking  Availability of multiple IP address helps users circumvent the system Nymble Blocking System 14
  • 15.  Nymble is comprehensive credential system.  Add a layer of accountability to any publicly known anonymizing network.  Servers blacklist misbehaving users maintaining their privacy.  Increase the mainstream acceptance of anonymizing network. Nymble Blocking System 15
  • 16.  www.airccse.org  www.torproject.org  www.sciencedirect.com  www.wikipedia.com Nymble Blocking System 16