• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

DMCA

Nymble: Anonymous IP-address blocking (2007)

Cached

  • Download as a PDF

Download Links

  • [www.cs.dartmouth.edu]
  • [www.ists.dartmouth.edu]
  • [www.cs.indiana.edu]
  • [www.cs.indiana.edu]
  • [www.cs.indiana.edu]
  • [www.cs.indiana.edu]
  • [www.cs.dartmouth.edu]
  • [www.cs.dartmouth.edu]
  • [www.freehaven.net]
  • [freehaven.net]
  • [cgi.soic.indiana.edu]
  • [cgi.soic.indiana.edu]
  • [cgi.soic.indiana.edu]
  • [www.cs.dartmouth.edu]
  • [www.cs.dartmouth.edu]
  • [www.freehaven.net]
  • [www.cs.dartmouth.edu]
  • [petworkshop.org]

  • Other Repositories/Bibliography

  • DBLP
  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Peter C. Johnson , Apu Kapadia , Patrick P. Tsang , Sean W. Smith
Venue:In Privacy Enhancing Technologies Symposium (PET ’07
Citations:29 - 4 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@INPROCEEDINGS{Johnson07nymble:anonymous,
    author = {Peter C. Johnson and Apu Kapadia and Patrick P. Tsang and Sean W. Smith},
    title = {Nymble: Anonymous IP-address blocking},
    booktitle = {In Privacy Enhancing Technologies Symposium (PET ’07},
    year = {2007},
    pages = {113--133},
    publisher = {Springer-Verlag}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

Abstract. Anonymizing networks such as Tor allow users to access Internet services privately using a series of routers to hide the client’s IP address from the server. Tor’s success, however, has been limited by users employing this anonymity for abusive purposes, such as defacing Wikipedia. Website administrators rely on IPaddress blocking for disabling access to misbehaving users, but this is not practical if the abuser routes through Tor. As a result, administrators block all Tor exit nodes, denying anonymous access to honest and dishonest users alike. To address this problem, we present a system in which (1) honest users remain anonymous and their requests unlinkable; (2) a server can complain about a particular anonymous user and gain the ability to blacklist the user for future connections; (3) this blacklisted user’s accesses before the complaint remain anonymous; and (4) users are aware of their blacklist status before accessing a service. As a result of these properties, our system is agnostic to different servers ’ definitions of misbehavior. 1

Keyphrases

anonymous ip-address blocking    different server definition    blacklist status    abusive purpose    tor exit node    particular anonymous user    tor success    website administrator    honest user    client ip address    anonymous access    future connection    access internet service   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University