Implementation and Performance Analysis of IP-Layer Chained Puzzles
نویسندگان
چکیده
As Distributed Denial-of-Service attacks become more prevalent and sophisticated, a promising new mechanism designed to defeat these attacks is client puzzles. Client puzzles force a computational load on clients before their traffic is forwarded thereby slowing the rate at which a client can inject traffic into the network. Chained puzzles are a type of IP-layer puzzle that require a series of puzzles to be solved while relieving servers of the burden of generating puzzles, thus reducing overhead on the router, an objective critical to the success of any puzzle mechanism. In this paper, we describe details of our implementation of IPlayer chained puzzles in the Linux kernel and provide results and analysis of puzzle overhead incurred by kernels running the protocol. We also demonstrate the effectiveness of chained puzzles to reduce the rate at which clients can send packets into the network and show that chained puzzles can effectively defeat a Denial-of-Service attack.
منابع مشابه
Mitigating Network-Based Denial-of-Service Attacks with Client Puzzles
Over the past few years, denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks have become more of a threat than ever. These attacks are aimed at denying or degrading service for a legitimate user by any means necessary. The need to propose and research novel methods to mitigate them has become a critical research issue in network security. Recently, client puzzle protocols h...
متن کاملOn Cryptographic Chained Puzzles
Cryptographic puzzles provide an elegant solution in combating denial of services attacks. In this paper we introduce the concept of chained puzzles and we define two kinds of chained puzzles: linearly chained puzzles and randomly chained puzzles. These construnstions prove to be very useful in some scenarios, from which the more general is in which a client may choose to solve only some of the...
متن کاملOn Chained Cryptographic Puzzles
Cryptographic puzzles provide an elegant solution in combating denial of services attacks. In this paper we introduce the concept of chained cryptographic puzzle. We define two kinds of chained puzzle constructions: linearly chained puzzles and randomly chained puzzles. The first construction prove to be very useful in some scenarios, from which the more general is in which a client may choose ...
متن کاملDesign and Implementation of Open MPI over QsNet/Elan4
Open MPI is a project recently initiated to provide a fault-tolerant, multi-network capable, and productionquality implementation of MPI-2 [20] interface based on experiences gained from FT-MPI [8], LA-MPI [10], LAM/MPI [28], and MVAPICH [23] projects. Its initial communication architecture is layered on top of TCP/IP. In this paper, we have designed and implemented Open MPI point-to-point laye...
متن کاملA linear chained approach for service invocation in IP Multimedia Subsystem
IP Multimedia Subsystem (IMS) is considered to provide multimedia services to users through an IP-based control plane. The current IMS service invocation mechanism, however , requires the Serving-Call Session Control Function (S-CSCF) invokes each Application Server (AS) sequentially to perform service subscription profile, which results in the heavy load of the S-CSCF and the long session setu...
متن کامل