An integrated approach to cryptographic mitigation of denial-of-service attacks


Autoria(s): Rangasamy, Jothi; Stebila, Douglas; Boyd, Colin; Gonzalez Nieto, Juan M.
Contribuinte(s)

Sandhu, Ravi

Wong, Duncan S.

Data(s)

2011

Resumo

Gradual authentication is a principle proposed by Meadows as a way to tackle denial-of-service attacks on network protocols by gradually increasing the confidence in clients before the server commits resources. In this paper, we propose an efficient method that allows a defending server to authenticate its clients gradually with the help of some fast-to-verify measures. Our method integrates hash-based client puzzles along with a special class of digital signatures supporting fast verification. Our hash-based client puzzle provides finer granularity of difficulty and is proven secure in the puzzle difficulty model of Chen et al. (2009). We integrate this with the fast-verification digital signature scheme proposed by Bernstein (2000, 2008). These schemes can be up to 20 times faster for client authentication compared to RSA-based schemes. Our experimental results show that, in the Secure Sockets Layer (SSL) protocol, fast verification digital signatures can provide a 7% increase in connections per second compared to RSA signatures, and our integration of client puzzles with client authentication imposes no performance penalty on the server since puzzle verification is a part of signature verification.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/41285/

Publicador

ACM

Relação

http://eprints.qut.edu.au/41285/1/asiaccs136-rangasamy.pdf

DOI:10.1145/1966913.1966929

Rangasamy, Jothi, Stebila, Douglas, Boyd, Colin, & Gonzalez Nieto, Juan M. (2011) An integrated approach to cryptographic mitigation of denial-of-service attacks. In Sandhu, Ravi & Wong, Duncan S. (Eds.) Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2011, ACM, HKU SPACE Admiralty Learning Center, Hong Kong, pp. 114-123.

Direitos

Copyright 2011 ACM

Copyright ACM, 2011. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2011, http://doi.acm.org/10.1145/1966913.1966929

Fonte

Computer Science; Faculty of Science and Technology; Information Security Institute

Palavras-Chave #080402 Data Encryption #080503 Networking and Communications #denial of service #client puzzles #Berstein's signatures #Secure Sockets Layer (SSL)
Tipo

Conference Paper