메뉴 건너뛰기




Volumn , Issue , 2011, Pages 114-123

An integrated approach to cryptographic mitigation of denial-of-service attacks

Author keywords

Bernstein's signatures; Client puzzles; Denial of service; Secure Sockets Layer (SSL)

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; NETWORK PROTOCOLS; NETWORK SECURITY;

EID: 79955993934     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1966913.1966929     Document Type: Conference Paper
Times cited : (12)

References (30)
  • 1
    • 85175133153 scopus 로고    scopus 로고
    • March, URL
    • ACME Labs. http load, March 2006. URL: http://www.acme.com/software/ httpload/.
    • (2006) ACME Labs. Http Load
  • 2
    • 0005966913 scopus 로고    scopus 로고
    • Stateless connections
    • T. Aura and P. Nikander. Stateless connections. In Y. Han, T. Okamoto, and S. Qing, editors, Proceedings of the First International Conference on Information and Communications Security (ICICS) 1997, volume 1334 of LNCS, pages 87-97. Springer, 1997. (Pubitemid 127148037)
    • (1997) Lecture Notes in Computer Science , Issue.1334 , pp. 87-97
    • Aura, T.1    Nikander, P.2
  • 3
    • 84949938425 scopus 로고    scopus 로고
    • DOS-Resistant Authentication with Client Puzzles
    • Security Protocols
    • T. Aura, P. Nikander, and J. Leiwo. DoS-resistant authentication with client puzzles. In B. Christianson, B. Crispo, J. A. Malcolm, and M. Roe, editors, Security Protocols: 8th International Workshop, volume 2133 of LNCS, pages 170-177. Springer, 2000. (Pubitemid 33347515)
    • (2001) Lecture Notes in Computer Science , Issue.2133 , pp. 170-177
    • Aura, T.1    Nikander, P.2    Leiwo, J.3
  • 8
    • 79956027674 scopus 로고    scopus 로고
    • URL:, 3 May
    • CERT. Denial of service attacks. URL: http://www.cert.org/techtips/ denialofservice.html 3 May 2010.
    • (2010) Denial of Service Attacks
  • 9
    • 72449146821 scopus 로고    scopus 로고
    • Security notions and generic constructions for client puzzles
    • M. Matsui, editor, volume 5912 of LNCS, Springer
    • L. Chen, P. Morrissey, N. P. Smart, and B. Warinschi. Security notions and generic constructions for client puzzles. In M. Matsui, editor, Advances in Cryptology - Proc. ASIACRYPT 2009, volume 5912 of LNCS, pages 505-523. Springer, 2009.
    • (2009) Advances in Cryptology - Proc. ASIACRYPT 2009 , pp. 505-523
    • Chen, L.1    Morrissey, P.2    Smart, N.P.3    Warinschi, B.4
  • 13
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen message attacks
    • April
    • S. Goldwasser, S. Micali, and R. L. Rivest. A digital signature scheme secure against adaptive chosen message attacks. SIAM Journal on Computing, 17(2):281-308, April 1988.
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.L.3
  • 15
    • 0004077031 scopus 로고    scopus 로고
    • Photuris: Session-key management protocol
    • March, URL
    • P. Karn and W. A. Simpson. Photuris: Session-key management protocol, March 1999. RFC 2522. URL: http://www.ietf.org/rfc/rfc2522.txt.
    • (1999) RFC , vol.2522
    • Karn, P.1    Simpson, W.A.2
  • 16
    • 33746646599 scopus 로고    scopus 로고
    • Internet Key Exchange (IKEv2) protocol
    • December, URL
    • C. Kaufman. Internet Key Exchange (IKEv2) protocol, December 2005. RFC 4306. URL: http://www.ietf.org/rfc/rfc4306.txt.
    • (2005) RFC , vol.4306
    • Kaufman, C.1
  • 17
    • 70349396267 scopus 로고    scopus 로고
    • Requirements for client puzzles to defeat the denial of service and the distributed denial of service attacks
    • V. Laurens, A. El-Saddik, and A. Nayak. Requirements for client puzzles to defeat the denial of service and the distributed denial of service attacks. International Arab Journal of Information Technology, 3(4):326{333, 2006.
    • (2006) International Arab Journal of Information Technology , vol.3 , Issue.4 , pp. 326-333
    • Laurens, V.1    El-Saddik, A.2    Nayak, A.3
  • 19
    • 0035075103 scopus 로고    scopus 로고
    • A cost-based framework for analysis of denial of service in networks
    • C. Meadows. A cost-based framework for analysis of denial of service networks. Journal of Computer Security, 9(1/2):143{164, 2001. (Pubitemid 32286900)
    • (2001) Journal of Computer Security , vol.9 , Issue.1-2 , pp. 143-164
    • Meadows, C.1
  • 26
    • 38349080863 scopus 로고    scopus 로고
    • Toward non-parallelizable client puzzles
    • F. Bao, S. Ling, T. Okamoto, H. Wang, and C. Xing, editors, volume 4856 of LNCS, Springer
    • S. Tritilanunt, C. Boyd, E. Foo, and J. González Nieto. Toward non-parallelizable client puzzles. In F. Bao, S. Ling, T. Okamoto, H. Wang, and C. Xing, editors, Cryptology and Network Security (CANS) 2007, volume 4856 of LNCS, pages 247-264. Springer, 2007.
    • (2007) Cryptology and Network Security (CANS) 2007 , pp. 247-264
    • Tritilanunt, S.1    Boyd, C.2    Foo, E.3    González Nieto, J.4
  • 28
    • 0019080452 scopus 로고
    • A modification of the RSA public-key encryption procedure
    • H. Williams. A modification of the RSA public-key encryption procedure. IEEE Transactions on Information Theory, 26(6):726-729, 1980. (Pubitemid 11460687)
    • (1980) IEEE Transactions on Information Theory , vol.IT-26 , Issue.6 , pp. 726-729
    • Williams, H.C.1
  • 30
    • 84889498828 scopus 로고    scopus 로고
    • Zona Research. April, URL
    • Zona Research. The need for speed II. April, 2001. URL: http://www.keynote.com/downloads/ZonaNeedForSpeed.pdf.
    • (2001) The Need for Speed II


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.