Nymble: Blocking Misbehaving Users in Anonymizing Networks. Tsang, P. P., Kapadia, A., Cornelius, C., & Smith, S. IEEE Transactions on Dependable and Secure Computing (TDSC), September, 2009.
Paper doi abstract bibtex Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client\textquoterights IP address from the server. The success of such networks, however, has been limited by users employing this anonymity for abusive purposes such as defacing popular websites. Website administrators routinely rely on IP-address blocking for disabling access to misbehaving users, but blocking IP addresses is not practical if the abuser routes through an anonymizing network. As a result, administrators block \em all known exit nodes of anonymizing networks, denying anonymous access to honest and dishonest users alike. To address this problem, we present Nymble, a system in which \emphservers can blacklist misbehaving users without compromising their anonymity. Our system is thus agnostic to different servers\textquoteright definitions of misbehavior \textemdash servers can block users for whatever reason, and the privacy of blacklisted users is maintained.
@article {nymble-tdsc,
title = {Nymble: Blocking Misbehaving Users in Anonymizing Networks},
journal = {IEEE Transactions on Dependable and Secure Computing (TDSC)},
year = {2009},
month = {September},
abstract = {Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client{\textquoteright}s IP address from the server. The success of such networks, however, has been limited by users employing this anonymity for abusive purposes such as defacing popular websites. Website administrators routinely rely on IP-address blocking for disabling access to misbehaving users, but blocking IP addresses is not practical if the abuser routes through an anonymizing network. As a result, administrators block {\em all} known exit nodes of anonymizing networks, denying anonymous access to honest and dishonest users alike. To address this problem, we present Nymble, a system in which \emph{servers can blacklist misbehaving users without compromising their anonymity}. Our system is thus agnostic to different servers{\textquoteright} definitions of misbehavior {\textemdash} servers can block users for whatever reason, and the privacy of blacklisted users is maintained.},
keywords = {authentication, privacy},
issn = {1545-5971},
doi = {10.1109/TDSC.2009.38},
url = {http://www.computer.org/portal/web/csdl/doi/10.1109/TDSC.2009.38},
author = {Patrick P. Tsang and Apu Kapadia and Cory Cornelius and Sean Smith}
}
Downloads: 0
{"_id":"345pnwXmvTyJNr5eH","bibbaseid":"tsang-kapadia-cornelius-smith-nymbleblockingmisbehavingusersinanonymizingnetworks-2009","downloads":0,"creationDate":"2018-07-03T04:50:27.829Z","title":"Nymble: Blocking Misbehaving Users in Anonymizing Networks","author_short":["Tsang, P. P.","Kapadia, A.","Cornelius, C.","Smith, S."],"year":2009,"bibtype":"article","biburl":"https://gnunet.org/bibliography/export/bibtex","bibdata":{"bibtype":"article","type":"article","title":"Nymble: Blocking Misbehaving Users in Anonymizing Networks","journal":"IEEE Transactions on Dependable and Secure Computing (TDSC)","year":"2009","month":"September","abstract":"Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client\\textquoterights IP address from the server. The success of such networks, however, has been limited by users employing this anonymity for abusive purposes such as defacing popular websites. Website administrators routinely rely on IP-address blocking for disabling access to misbehaving users, but blocking IP addresses is not practical if the abuser routes through an anonymizing network. As a result, administrators block \\em all known exit nodes of anonymizing networks, denying anonymous access to honest and dishonest users alike. To address this problem, we present Nymble, a system in which \\emphservers can blacklist misbehaving users without compromising their anonymity. Our system is thus agnostic to different servers\\textquoteright definitions of misbehavior \\textemdash servers can block users for whatever reason, and the privacy of blacklisted users is maintained.","keywords":"authentication, privacy","issn":"1545-5971","doi":"10.1109/TDSC.2009.38","url":"http://www.computer.org/portal/web/csdl/doi/10.1109/TDSC.2009.38","author":[{"firstnames":["Patrick","P."],"propositions":[],"lastnames":["Tsang"],"suffixes":[]},{"firstnames":["Apu"],"propositions":[],"lastnames":["Kapadia"],"suffixes":[]},{"firstnames":["Cory"],"propositions":[],"lastnames":["Cornelius"],"suffixes":[]},{"firstnames":["Sean"],"propositions":[],"lastnames":["Smith"],"suffixes":[]}],"bibtex":"@article {nymble-tdsc,\n\ttitle = {Nymble: Blocking Misbehaving Users in Anonymizing Networks},\n\tjournal = {IEEE Transactions on Dependable and Secure Computing (TDSC)},\n\tyear = {2009},\n\tmonth = {September},\n\tabstract = {Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client{\\textquoteright}s IP address from the server. The success of such networks, however, has been limited by users employing this anonymity for abusive purposes such as defacing popular websites. Website administrators routinely rely on IP-address blocking for disabling access to misbehaving users, but blocking IP addresses is not practical if the abuser routes through an anonymizing network. As a result, administrators block {\\em all} known exit nodes of anonymizing networks, denying anonymous access to honest and dishonest users alike. To address this problem, we present Nymble, a system in which \\emph{servers can blacklist misbehaving users without compromising their anonymity}. Our system is thus agnostic to different servers{\\textquoteright} definitions of misbehavior {\\textemdash} servers can block users for whatever reason, and the privacy of blacklisted users is maintained.},\n\tkeywords = {authentication, privacy},\n\tissn = {1545-5971},\n\tdoi = {10.1109/TDSC.2009.38},\n\turl = {http://www.computer.org/portal/web/csdl/doi/10.1109/TDSC.2009.38},\n\tauthor = {Patrick P. Tsang and Apu Kapadia and Cory Cornelius and Sean Smith}\n}\n","author_short":["Tsang, P. P.","Kapadia, A.","Cornelius, C.","Smith, S."],"key":"nymble-tdsc","id":"nymble-tdsc","bibbaseid":"tsang-kapadia-cornelius-smith-nymbleblockingmisbehavingusersinanonymizingnetworks-2009","role":"author","urls":{"Paper":"http://www.computer.org/portal/web/csdl/doi/10.1109/TDSC.2009.38"},"keyword":["authentication","privacy"],"downloads":0},"search_terms":["nymble","blocking","misbehaving","users","anonymizing","networks","tsang","kapadia","cornelius","smith"],"keywords":["authentication","privacy"],"authorIDs":[],"dataSources":["FWsPTwsmjtrBtRS3B"]}