Networking

Tracing Misbehaving Users by Utilizing Ticket-Based Protocols by Trusted Third Party in Anonymizing Networks

Free registration required

Executive Summary

Anonymizing networks provides network services to users without specific identity. Network administrator cannot identify user actions in anonymizing networks. Anonymizing networks such as The Onion Routing Networks (TOR) uses a layer structured encrypted message and series of routers each with a key to decrypt and forward the message. Which hide's the client's IP address from the server. The limitation of such networks is the users who employing this anonymity for opprobrious purposes. They use their anonymity for disfiguring web sites. The common action done by web servers is IP-address blocking but it is not possible in case of anonymous networks.

  • Format: PDF
  • Size: 397.04 KB