Stateless connections
نویسندگان
چکیده
We describe a secure transformation of stateful connections or parts of them into stateless ones by attaching the state information to the messages. Secret-key cryptography is used for protection of integrity and con dentiality of the state data and the connections. The stateless protocols created in this way are more robust against denial of service resulting from high loads and resource exhausting attacks than their stateful counterparts. In particular, stateless authentication resists attacks that leave connections in a half-open state.
منابع مشابه
A Survey of Results on Stateless Multicounter Automata
A stateless multicounter machine has m-counters operating on a one-way input delimited by left and right end markers. A move of the machine depends only on the symbol under the input head and the sign pattern of the counters. An input string is accepted if, when the input head is started on the left end marker with all counters zero, the machine eventually reaches the configuration where the in...
متن کاملOn Event Reproduction Ratio in Stateless and Stateful Replay of Real-World Traffic
Capturing and replaying network flows are important for testing network devices. Replayed traffic should reproduce effects similar to live traffic. This work presents methods to measure the event reproduction ratio, and studies the effectiveness of stateless and stateful traffic replayers based on the events triggered by packets and connections. We use two replayers, SocketReplay and Tcpreplay,...
متن کاملConsistency verification of stateful firewalls is not harder than the stateless case
Firewalls play an important role in the enforcement of access control policies in contemporary networks. However, firewalls are effective only if they are configured correctly such that their access control rules are consistent and the firewall indeed implements the intended access control policy. Unfortunately, due to the potentially large number of rules and their complex relationships with e...
متن کاملBuffer management schemes for supporting TCP in gigabit routers with per-flow queueing
Recently, there has been much interest in using active queue management in routers in order to protect users from connections that are not very responsive to congestion notification. A recent Internet draft recommends schemes based on random early detection for achieving the above goals, to the extent possible, in a system without “per-flow” state. However, a “stateless" system with FIFO queuei...
متن کاملMobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks
Intelligent transportation system attracts a great deal of research attention because it helps enhance traffic safety, improve driving experiences, and transportation efficiency. Vehicular Ad Hoc Network (VANET) supports wireless connections among vehicles and offers information exchange, thus significantly facilitating intelligent transportation systems. Since the vehicles move fast and often ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1997