메뉴 건너뛰기




Volumn , Issue , 2004, Pages 246-256

New client puzzle outsourcing techniques for DoS resistance

Author keywords

Client Puzzles; Denial of Service; DoS

Indexed keywords

CLIENT SERVER COMPUTER SYSTEMS; COMPUTER CRIME; ELECTRONIC COMMERCE; GATEWAYS (COMPUTER NETWORKS); INFORMATION SERVICES; NETWORK PROTOCOLS; SERVERS; TELECOMMUNICATION TRAFFIC;

EID: 14844300104     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1030083.1030117     Document Type: Conference Paper
Times cited : (130)

References (37)
  • 1
    • 85045893940 scopus 로고    scopus 로고
    • Moderately hard, memory-bound functions
    • Internet Society
    • M. Abadi, M. Burrows, M. Manasse, and T. Wobber. Moderately hard, memory-bound functions. In NDSS '03, pages 107-121. Internet Society, 2003.
    • (2003) NDSS '03 , pp. 107-121
    • Abadi, M.1    Burrows, M.2    Manasse, M.3    Wobber, T.4
  • 3
    • 0036036842 scopus 로고    scopus 로고
    • Tradeoffs in probabilistic packet marking for IP traceback
    • ACM Press
    • M. Adler. Tradeoffs in probabilistic packet marking for IP traceback. In STOC '02, pages 407-418. ACM Press, 2002.
    • (2002) STOC '02 , pp. 407-418
    • Adler, M.1
  • 5
    • 3543121457 scopus 로고    scopus 로고
    • Preventing Internet denial-of-service with capabilities
    • ACM Press
    • T. Anderson, T. Roscoe, and D. Wetherall. Preventing Internet denial-of-service with capabilities. In HotNets-II. ACM Press, 2003.
    • (2003) HotNets-II
    • Anderson, T.1    Roscoe, T.2    Wetherall, D.3
  • 7
    • 14844310899 scopus 로고    scopus 로고
    • Original system developed in 1997. Manuscript. Referenced 2004
    • A. Back. Hashcash - a denial-of-service countermeasure, 2002. Original system developed in 1997. Manuscript. Referenced 2004 at http://www.hashcash. org/hashcash.pdf.
    • (2002) Hashcash - A Denial-of-service Countermeasure
    • Back, A.1
  • 10
    • 0037623983 scopus 로고    scopus 로고
    • Identity based encryption from the weil pairing
    • D. Boneh and M. Franklin. Identity based encryption from the Weil pairing. SIAM J. of Computing, 32(3):586-615, 2003.
    • (2003) SIAM J. of Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 15
    • 35248835679 scopus 로고    scopus 로고
    • On memory-bound functions for fighting spam
    • D. Boneh, editor. Springer-Verlag
    • C. Dwork, A. Goldberg, and M. Naor. On memory-bound functions for fighting spam. In D. Boneh, editor, CRYPTO '03, pages 426-444. Springer-Verlag, 2003.
    • (2003) CRYPTO '03 , pp. 426-444
    • Dwork, C.1    Goldberg, A.2    Naor, M.3
  • 16
    • 0001126172 scopus 로고
    • Pricing via processing or combatting junk mail
    • Ernest F. Brickell, editor. Springer-Verlag
    • C. Dwork and M. Naor. Pricing via processing or combatting junk mail. In Ernest F. Brickell, editor, CRYPTO '92, pages 139-147. Springer-Verlag, 1992.
    • (1992) CRYPTO '92 , pp. 139-147
    • Dwork, C.1    Naor, M.2
  • 17
    • 3142747919 scopus 로고    scopus 로고
    • Auditable metering with lightweight security
    • R. Hirschfeld, editor. Springer-Verlag
    • M.K. Franklin and D. Malkhi. Auditable metering with lightweight security. In R. Hirschfeld, editor, Financial Cryptography '97, pages 151-160. Springer-Verlag, 1997.
    • (1997) Financial Cryptography '97 , pp. 151-160
    • Franklin, M.K.1    Malkhi, D.2
  • 18
    • 0042254288 scopus 로고    scopus 로고
    • Curbing junk e-mail via secure classification
    • R. Hirschfeld, editor. Springer-Verlag
    • E. Gabber, M. Jakobsson, Y. Matias, and A. Mayer. Curbing junk e-mail via secure classification. In R. Hirschfeld, editor, Financial Cryptography '98. Springer-Verlag, 1998.
    • (1998) Financial Cryptography '98
    • Gabber, E.1    Jakobsson, M.2    Matias, Y.3    Mayer, A.4
  • 19
    • 14844282689 scopus 로고    scopus 로고
    • Guaranteeing access in spite of service-flooding attacks
    • Virgil D. Gligor. Guaranteeing access in spite of service-flooding attacks. In Security Protocols Workshop, 2003.
    • (2003) Security Protocols Workshop
    • Gligor, V.D.1
  • 20
    • 3042593993 scopus 로고    scopus 로고
    • Publicly verifiable lotteries: Applications of delaying functions
    • R. Hirschfeld, editor. Springer-Verlag
    • D. Goldschlag and S. Stubblebine. Publicly verifiable lotteries: Applications of delaying functions. In R. Hirschfeld, editor, Financial Cryptography '98. Springer-Verlag, 1998.
    • (1998) Financial Cryptography '98
    • Goldschlag, D.1    Stubblebine, S.2
  • 22
    • 14844286782 scopus 로고    scopus 로고
    • Proofs of work and bread pudding protocols
    • Kluwer Academic
    • M. Jakobsson and A. Juels. Proofs of work and bread pudding protocols. In Communications and Multimedia Security, pages 258-272. Kluwer Academic, 1999.
    • (1999) Communications and Multimedia Security , pp. 258-272
    • Jakobsson, M.1    Juels, A.2
  • 26
    • 0017959977 scopus 로고
    • Secure communications over insecure channels
    • April
    • R. Merkle. Secure communications over insecure channels. Communications of the ACM, 21(8):294-299, April 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.8 , pp. 294-299
    • Merkle, R.1
  • 27
    • 84860093441 scopus 로고    scopus 로고
    • The Netfilter/Iptables Project. Web site at http://www.netfilter.org.
  • 28
    • 84860093439 scopus 로고    scopus 로고
    • The GNU MP Project. Web site at http://www.gnu.org/software/gmp/gmp.html.
  • 29
    • 0010602889 scopus 로고    scopus 로고
    • Time-lock puzzles and timed-release crypto
    • MIT
    • R.L. Rivest, A. Shamir, and D. Wagner. Time-lock puzzles and timed-release crypto. Technical Report MIT/LCS/TR-684, MIT, 1996.
    • (1996) Technical Report , vol.MIT-LCS-TR-684
    • Rivest, R.L.1    Shamir, A.2    Wagner, D.3
  • 31
    • 0040935952 scopus 로고    scopus 로고
    • Security of discrete log cryptosystems in the random oracle and generic model
    • The Fields Institute
    • C.-P. Schnorr and M. Jakobsson. Security of discrete log cryptosystems in the random oracle and generic model. In The Mathematics of Public-Key Cryptography. The Fields Institute, 1999.
    • (1999) The Mathematics of Public-Key Cryptography
    • Schnorr, C.-P.1    Jakobsson, M.2
  • 33
    • 0034997397 scopus 로고    scopus 로고
    • Advanced and authenticated marking schemes for IP traceback
    • D. X. Song and A. Perrig. Advanced and authenticated marking schemes for IP traceback. In IEEE INFOCOM, pages 878-886, 2001.
    • (2001) IEEE INFOCOM , pp. 878-886
    • Song, D.X.1    Perrig, A.2
  • 34
    • 85084163540 scopus 로고    scopus 로고
    • Centertrack: An IP overlay network for tracking DoS floods
    • R. Stone. CenterTrack: An IP overlay network for tracking DoS floods. In USENIX Security '00, 2000.
    • (2000) USENIX Security '00
    • Stone, R.1
  • 35
    • 35248831179 scopus 로고    scopus 로고
    • Captcha: Using hard AI problems for security
    • E. Biham, editor. Springer-Verlag
    • L. von Ahn, M. Blum, N.J. Hopper, and J. Langford. CAPTCHA: Using hard AI problems for security. In E. Biham, editor, Eurocrypt '03, pages 294-311. Springer-Verlag, 2003.
    • (2003) Eurocrypt '03 , pp. 294-311
    • Von Ahn, L.1    Blum, M.2    Hopper, N.J.3    Langford, J.4
  • 36
    • 0038825046 scopus 로고    scopus 로고
    • Defending against denial-of-service attacks with puzzle auctions
    • X. Wang and M. K. Reiter. Defending against denial-of-service attacks with puzzle auctions. In IEEE Symposium on Security and Privacy, pages 78-92, 2003.
    • (2003) IEEE Symposium on Security and Privacy , pp. 78-92
    • Wang, X.1    Reiter, M.K.2
  • 37
    • 0037810705 scopus 로고    scopus 로고
    • Pi: A path identification mechanism to defend against DDoS attacks
    • A. Yaar, A. Perrig, and D. Song. Pi: A path identification mechanism to defend against DDoS attacks. In IEEE Symposium on Security and Privacy, pages 93-109, 2003.
    • (2003) IEEE Symposium on Security and Privacy , pp. 93-109
    • Yaar, A.1    Perrig, A.2    Song, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.