Hashcash - A Denial of Service Counter-Measure
نویسنده
چکیده
Hashcash was originally proposed as a mechanism to throttle systematic abuse of un-metered internet resources such as email, and anonymous remailers in May 1997. Five years on, this paper captures in one place the various applications, improvements suggested and related subsequent publications, and describes initial experience from experiments using hashcash. The hashcash CPU cost-function computes a token which can be used as a proof-of-work. Interactive and noninteractive variants of cost-functions can be constructed which can be used in situations where the server can issue a challenge (connection oriented interactive protocol), and where it can not (where the communication is store–and– forward, or packet oriented) respectively.
منابع مشابه
Analysis of Four Distributed Denial of Service Counter-measures
The ever increasing sophistication of Distributed denial of service (DDoS) attackers and attack tools is causing detection and protection to become even more difficult and complex. To address this menace, the Internet research community has proposed many promising countermeasures, yet currently none has been widely deployed. For a system administrator, choosing a counter-measure has become a da...
متن کاملar X iv : c s . C R / 0 40 20 46 v 1 1 9 Fe b 20 04 SPAM FILTER ANALYSIS
Unsolicited bulk email (aka. spam) is a major problem on the Internet. To counter spam, several techniques, ranging from spam filters to mail protocol extensions like hashcash, have been proposed. In this paper we investigate the effectiveness of several spam filtering techniques and technologies. Our analysis was performed by simulating email traffic under different conditions. We show that ge...
متن کاملSpam Filter Analysis
Unsolicited bulk email (aka. spam) is a major problem on the Internet. To counter spam, several techniques, ranging from spam filters to mail protocol extensions like hashcash, have been proposed. In this paper we investigate the effectiveness of several spam filtering techniques and technologies. Our analysis was performed by simulating email traffic under different conditions. We show that ge...
متن کاملHF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets
Abstract—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks. Such attacks with the occupation of system resources, have proven to be an effective method of denying network services. Botnets that launch HTTP packet flood attacks agains...
متن کامل802.11 DCF Denial of Service Vulnerabilities
Abstract This paper addresses denial of service vulnerabilities (DOS) in 802.11 wireless LANs that arise from the 802.11 distributed coordination function (DCF). We demonstrate that the DCF is vulnerable to equivalent DOS attacks at both the MAC and PHY layers. Denial of service attacks against the DCF are easily staged by a single adversary and affect both infrastructure and mobile ad hoc netw...
متن کامل