Stamping Wildcat Users in Stripping Mesh for Secluded Networks by Using Nymble

Download Now
Provided by: IJAIR
Topic: Security
Format: PDF
Anonymizing networks such as tor allow users to access Internet services privately by using a series of routers to hide the client's IP address from the server. The success of such networks, however, has been limited by users employing this anonymity for abusive purposes such as defacing popular websites. Website administrators routinely rely on IP-address blocking for disabling access to misbehaving users, but blocking IP addresses is not practical if the abuser routes through an anonymizing network. As a result, administrators block all known exit nodes of anonymizing networks, denying anonymous access to misbehaving and behaving users alike.
Download Now

Find By Topic