메뉴 건너뛰기




Volumn , Issue , 2011, Pages 25-32

Defending web services against denial of service attacks using client puzzles

Author keywords

Client puzzles; Denial of service attacks; Web services

Indexed keywords

DENIAL-OF-SERVICE ATTACK; INTEROPERABILITY; SEMANTICS; WEBSITES;

EID: 80053139318     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICWS.2011.22     Document Type: Conference Paper
Times cited : (25)

References (26)
  • 4
    • 38949108959 scopus 로고    scopus 로고
    • Preventing Service Oriented Denial of Service (PreSODoS): A proposed approach
    • DOI 10.1109/ICWS.2006.102, 4032071, Proceedings - ICWS 2006: 2006 IEEE International Conference on Web Services
    • S. Padmanabhuni, V. Singh, K. M. S. Kumar, and A. Chatterjee, "Preventing service oriented denial of service (Pre-SODoS): A proposed approach," in Proceedings of the IEEE International Conference on Web Services. Washington, DC, USA: IEEE Computer Society, 2006, pp. 577-584. (Pubitemid 351209897)
    • (2006) Proceedings - ICWS 2006: 2006 IEEE International Conference on Web Services , pp. 577-584
    • Padmanabhuni, S.1    Singh, V.2    Kumar, K.M.S.3    Chatterjee, A.4
  • 5
    • 78650317639 scopus 로고    scopus 로고
    • Validating denial of service vulnerabilities in web services
    • Network and System Security IEEE Computer Society
    • S. Suriadi, A. Clark, and D. Schmidt, "Validating denial of service vulnerabilities in web services," in Network and System Security, International Conference on Network and System Security. IEEE Computer Society, 2010, pp. 175-182.
    • (2010) International Conference on Network and System Security , pp. 175-182
    • Suriadi, S.1    Clark, A.2    Schmidt, D.3
  • 9
    • 85084161590 scopus 로고    scopus 로고
    • Political DDoS: Estonia and beyond
    • USENIX, July
    • J. Nazario, "Political DDoS: Estonia and beyond," in USENIX Security '08. USENIX, July 2008, http://streaming.linux-magazin.de/events/ usec08/tech/archive/jnazario/.
    • (2008) USENIX Security '08
    • Nazario, J.1
  • 12
    • 84943235829 scopus 로고
    • Pricing via processing or combatting junk mail
    • E. F. Brickell, Ed. Springer
    • C. Dwork and M. Naor, "Pricing via processing or combatting junk mail," in Advances in Cryptology - Proc. CRYPTO '92, ser. LNCS, E. F. Brickell, Ed., vol. 740. Springer, 1992, pp. 139-147.
    • (1992) Advances in Cryptology - Proc. CRYPTO '92, Ser. LNCS , vol.740 , pp. 139-147
    • Dwork, C.1    Naor, M.2
  • 13
    • 84861587712 scopus 로고    scopus 로고
    • Client puzzles: A cryptographic countermeasure against connection depletion attacks
    • Internet Society [Online]
    • A. Juels and J. Brainard, "Client puzzles: A cryptographic countermeasure against connection depletion attacks," in Proc. Internet Society Network and Distributed System Security Symposium (NDSS) 1999. Internet Society, 1999, pp. 151-165. [Online]. Available: http://www.isoc.org/isoc/ conferences/ndss/99/proceedings/
    • (1999) Proc. Internet Society Network and Distributed System Security Symposium (NDSS) 1999 , pp. 151-165
    • Juels, A.1    Brainard, J.2
  • 14
    • 84949938425 scopus 로고    scopus 로고
    • DOS-resistant authentication with client puzzles
    • Security Protocols
    • T. Aura, P. Nikander, and J. Leiwo, "DOS-resistant authentication with client puzzles," in Security Protocols: 8th International Workshop, ser. LNCS, B. Christianson, B. Crispo, J. A. Malcolm, and M. Roe, Eds., vol. 2133. Springer, 2000, pp. 170-177. (Pubitemid 33347515)
    • (2001) Lecture Notes in Computer Science , Issue.2133 , pp. 170-177
    • Aura, T.1    Nikander, P.2    Leiwo, J.3
  • 15
    • 84872811083 scopus 로고    scopus 로고
    • Modelling denial of service attacks on JFK with meadows's cost-based framework
    • R. Buyya, T. Ma, R. Safavi-Naini, C. Steketee, and W. Susilo, Eds. Australian Computer Society [Online]
    • J. Smith, J. González Nieto, and C. Boyd, "Modelling denial of service attacks on JFK with Meadows's cost-based framework," in Proc. 4th Australasian Information Security Workshop - Network Security (AISW-NetSec) 2006, ser. CRPIT, R. Buyya, T. Ma, R. Safavi-Naini, C. Steketee, and W. Susilo, Eds., vol. 54. Australian Computer Society, 2006, pp. 125-134. [Online]. Available: http://crpit.com/confpapers/CRPITV54Smith.pdf
    • (2006) Proc. 4th Australasian Information Security Workshop - Network Security (AISW-NetSec) 2006, Ser. CRPIT , vol.54 , pp. 125-134
    • Smith, J.1    González Nieto, J.2    Boyd, C.3
  • 17
    • 79951789972 scopus 로고    scopus 로고
    • PTCP: A client puzzle protocol for defending against resource exhaustion denial of service attacks
    • Department of Electrical and Computer Engineering October [Online]
    • T. J. McNevin, J.-M. Park, and R. Marchany, "pTCP: A client puzzle protocol for defending against resource exhaustion denial of service attacks," Department of Electrical and Computer Engineering, Virginia Tech, Technical Report TR-ECE-04-10, October 2004. [Online]. Available: http://www.arias.ece.vt.edu/publications/TechReports/mcNevin-2004-1.pdf
    • (2004) Virginia Tech, Technical Report TR-ECE-04-10
    • McNevin, T.J.1    Park, J.-M.2    Marchany, R.3
  • 18
    • 85084162892 scopus 로고    scopus 로고
    • Using client puzzles to protect TLS
    • [Online]
    • D. Dean and A. Stubblefield, "Using client puzzles to protect TLS," in Proc. 10th USENIX Security Symposium, 2001. [Online]. Available: http://www.usenix.org/events/sec01/dean.html
    • (2001) Proc. 10th USENIX Security Symposium
    • Dean, D.1    Stubblefield, A.2
  • 21
    • 33845531695 scopus 로고    scopus 로고
    • Protecting web services from DoS attacks by SOAP message validation
    • DOI 10.1007/0-387-33406-8-15, Security and Privacy in Dynamic Environments: Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden
    • N. Gruschka and N. Luttenberger, "Protecting web services from DoS attacks by SOAP message validation," in Security and Privacy in Dynamic Environments, ser. IFIP International Federation for Information Processing, S. Fischer-Hbner, K. Rannenberg, L. Yngstrm, and S. Lindskog, Eds. Springer Boston, 2006, vol. 201, pp. 171-182, 10.1007/0-387-334068-15. (Pubitemid 44920652)
    • (2006) IFIP International Federation for Information Processing , vol.201 , pp. 171-182
    • Gruschka, N.1    Luttenberger, N.2
  • 24
    • 77955035143 scopus 로고    scopus 로고
    • A multiagent solution to adaptively classify SOAP message and protect against DoS attack
    • P. Meseguer, L. Mandow, and R. Gasca, Eds. Springer Berlin / Heidelberg 10.1007/978-3-642-142642-19
    • C. Pinzón, J. De Paz, J. Bajo, and J. Corchado, "A multiagent solution to adaptively classify SOAP message and protect against DoS attack," in Current Topics in Artificial Intelligence, ser. Lecture Notes in Computer Science, P. Meseguer, L. Mandow, and R. Gasca, Eds. Springer Berlin / Heidelberg, 2010, vol. 5988, pp. 181-190, 10.1007/978-3-642-142642-19.
    • (2010) Current Topics in Artificial Intelligence, Ser. Lecture Notes in Computer Science , vol.5988 , pp. 181-190
    • Pinzón, C.1    De Paz, J.2    Bajo, J.3    Corchado, J.4
  • 26
    • 63149089944 scopus 로고    scopus 로고
    • Countering DDoS and XDoS attacks against web services
    • Los Alamitos, CA, USA: IEEE Computer Society
    • X. Ye, "Countering DDoS and XDoS attacks against web services," in IEEE/IFIP International Conference on Embedded and Ubiquitous Computing. Los Alamitos, CA, USA: IEEE Computer Society, 2008, pp. 346-352.
    • (2008) IEEE/IFIP International Conference on Embedded and Ubiquitous Computing , pp. 346-352
    • Ye, X.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.