{"title":"A Denial-of-Service Resistant Authentication Solution for Security Protocols","authors":"Yinqing Li, Jianhui Chen","doi":"10.1109/IITA.2007.90","DOIUrl":null,"url":null,"abstract":"Nowadays, security protocols are under the threat of compute resource exhausting DoS attack and memory resource exhausting DoS attack. Based on the research of Cookie method and Client Puzzle way, a sponsor identity authenticating solution for resisting DoS attacks was presented, which can improve security protocol: by only add two or three messages based on original protocol can the solution enhances the original protocol's ability on resisting resource exhausting DoS attacks without changing its architecture. The frame and implementation of solution was presented, then, the solution analysis and experiment was conducted. The experimental result confirmed the validity of this solution, and showed that the solution can enhance the ability of security protocols on resisting resource exhausting DoS attack.","PeriodicalId":191218,"journal":{"name":"Workshop on Intelligent Information Technology Application (IITA 2007)","volume":"175 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Workshop on Intelligent Information Technology Application (IITA 2007)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IITA.2007.90","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Nowadays, security protocols are under the threat of compute resource exhausting DoS attack and memory resource exhausting DoS attack. Based on the research of Cookie method and Client Puzzle way, a sponsor identity authenticating solution for resisting DoS attacks was presented, which can improve security protocol: by only add two or three messages based on original protocol can the solution enhances the original protocol's ability on resisting resource exhausting DoS attacks without changing its architecture. The frame and implementation of solution was presented, then, the solution analysis and experiment was conducted. The experimental result confirmed the validity of this solution, and showed that the solution can enhance the ability of security protocols on resisting resource exhausting DoS attack.