Corpus ID: 18151070

Deamplification of DoS Attacks via Puzzles

@inproceedings{Beal2004DeamplificationOD,
  title={Deamplification of DoS Attacks via Puzzles},
  author={J. Beal},
  year={2004}
}
Puzzles have been proposed as a mechanism to deamplify denial of service attacks against a server’s memory and processing resources. For example, HIP implements a cookie puzzle mechanism to protect the server from wasting resources performing Diffie-Hellman exponentiation in response to spurious requests. We examine cookie puzzle mechanisms of this type. We find that careful attention is needed in server implementation to ensure that an attacker does not retain opportunities to amplify the… Expand

Figures and Tables from this paper

Examining the DoS Resistance of HIP
Using Coloured Petri Nets to Simulate DoS-resistant Protocols
ForCES protocol design analysis for protection against DoS attacks
  • S. Lakkavalli, H. Khosravi
  • Computer Science
  • Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)
  • 2004
Secure Networking for Virtual Machines in the Cloud
Automatic detection of DoS vulnerabilities of cryptographic protocols

References

SHOWING 1-10 OF 15 REFERENCES
Using Client Puzzles to Protect TLS
DOS-Resistant Authentication with Client Puzzles
Dynamic perfect hashing: upper and lower bounds
Host Identity Protocol Architecture Internet Draft, Internet Engineering Task Force Work in progress, version 6. http://www.ietf.org/internet-drafts/ draft-moskowitz-hip-arch-06
  • Host Identity Protocol Architecture Internet Draft, Internet Engineering Task Force Work in progress, version 6. http://www.ietf.org/internet-drafts/ draft-moskowitz-hip-arch-06
  • 2004
Host Identity Protocol, Internet Draft, Internet Engineering Task Force Work in progress. http://www.ietf.org/internet-drafts/ draft-ietf-hip-base-00
  • Host Identity Protocol, Internet Draft, Internet Engineering Task Force Work in progress. http://www.ietf.org/internet-drafts/ draft-ietf-hip-base-00
  • 2004
Internet Key Exchange (IKEv2) Protocol. Internet Draft, Internet Engineering Task Force Work in progress, version 17
  • Internet Key Exchange (IKEv2) Protocol. Internet Draft, Internet Engineering Task Force Work in progress, version 17
  • 2004
TCP SYN Flooding
...
1
2
...