Implementation and Performance Analysis of IP-Layer Chained Puzzles

نویسندگان

  • Aric Blumer
  • David Raymond
چکیده

As Distributed Denial-of-Service attacks become more prevalent and sophisticated, a promising new mechanism designed to defeat these attacks is client puzzles. Client puzzles force a computational load on clients before their traffic is forwarded thereby slowing the rate at which a client can inject traffic into the network. Chained puzzles are a type of IP-layer puzzle that require a series of puzzles to be solved while relieving servers of the burden of generating puzzles, thus reducing overhead on the router, an objective critical to the success of any puzzle mechanism. In this paper, we describe details of our implementation of IPlayer chained puzzles in the Linux kernel and provide results and analysis of puzzle overhead incurred by kernels running the protocol. We also demonstrate the effectiveness of chained puzzles to reduce the rate at which clients can send packets into the network and show that chained puzzles can effectively defeat a Denial-of-Service attack.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mitigating Network-Based Denial-of-Service Attacks with Client Puzzles

Over the past few years, denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks have become more of a threat than ever. These attacks are aimed at denying or degrading service for a legitimate user by any means necessary. The need to propose and research novel methods to mitigate them has become a critical research issue in network security. Recently, client puzzle protocols h...

متن کامل

On Cryptographic Chained Puzzles

Cryptographic puzzles provide an elegant solution in combating denial of services attacks. In this paper we introduce the concept of chained puzzles and we define two kinds of chained puzzles: linearly chained puzzles and randomly chained puzzles. These construnstions prove to be very useful in some scenarios, from which the more general is in which a client may choose to solve only some of the...

متن کامل

On Chained Cryptographic Puzzles

Cryptographic puzzles provide an elegant solution in combating denial of services attacks. In this paper we introduce the concept of chained cryptographic puzzle. We define two kinds of chained puzzle constructions: linearly chained puzzles and randomly chained puzzles. The first construction prove to be very useful in some scenarios, from which the more general is in which a client may choose ...

متن کامل

Design and Implementation of Open MPI over QsNet/Elan4

Open MPI is a project recently initiated to provide a fault-tolerant, multi-network capable, and productionquality implementation of MPI-2 [20] interface based on experiences gained from FT-MPI [8], LA-MPI [10], LAM/MPI [28], and MVAPICH [23] projects. Its initial communication architecture is layered on top of TCP/IP. In this paper, we have designed and implemented Open MPI point-to-point laye...

متن کامل

A linear chained approach for service invocation in IP Multimedia Subsystem

IP Multimedia Subsystem (IMS) is considered to provide multimedia services to users through an IP-based control plane. The current IMS service invocation mechanism, however , requires the Serving-Call Session Control Function (S-CSCF) invokes each Application Server (AS) sequentially to perform service subscription profile, which results in the heavy load of the S-CSCF and the long session setu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005