Trusted Puzzle Solvers without Clock Support against Spam and Denial-of-Service Attacks

نویسندگان

  • Rui Deng
  • Zuoning Chen
چکیده

Spam and Denial-of-Service (DoS) attacks are growing threats on the Internet. Cryptographic puzzles can be used to address the problem effectively. Additionally, the Trusted Puzzle Solver (TPS), which is similar to the Trusted Platform Module (TPM), is also proposed to help constructing crypto puzzles that may have some outstanding specialties in security and efficiency. Based on the analysis and discussion of two existing crypto puzzles relying on the TPS with a trusted clock, two new improved crypto puzzles are presented, and all the drawbacks found in the old ones are eliminated. The TPS in the new crypto puzzles doesn’t have to be equipped with a clock thus can be realized by the TPM without modification. Also, prototype experiments show that the new crypto puzzles can do better in mitigating

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Combating Spam and Denial-of-Service Attacks with Trusted Puzzle Solvers

Cryptographic puzzles can be used to mitigate spam and denial-of-service (DoS) attacks, as well as to implement timed-release cryptography. However, existing crypto puzzles are impractical because: (1) solving them wastes computing resources and/or human time, (2) the time it takes to solve them can vary dramatically across computing platforms, and/or (3) applications become non-interoperable d...

متن کامل

3D CAD Model Representation and Retrieval based on Hierarchical Graph

REGULAR PAPERS 3D CAD Model Representation and Retrieval Based on Hierarchical Graph Bo Ding, Xiao-yang Yu, and Lu Liu Computational Features of the Thinking and the Thinking Attributes of Computing: on Computational Thinking Wenchong Shi, Maohua Liu, and Peter Hendler Optimizing Test Case Execution Schedule using Classifiers Xiang Chen, Zhaofei Tan, Jian Xia, and Pengfei He Detecting double-co...

متن کامل

HF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets

Abstract—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks. Such attacks with the occupation of system resources, have proven to be an effective method of denying network services. Botnets that launch HTTP packet flood attacks agains...

متن کامل

Moving dispersion method for statistical anomaly detection in intrusion detection systems

A unified method for statistical anomaly detection in intrusion detection systems is theoretically introduced. It is based on estimating a dispersion measure of numerical or symbolic data on successive moving windows in time and finding the times when a relative change of the dispersion measure is significant. Appropriate dispersion measures, relative differences, moving windows, as well as tec...

متن کامل

Brief Announcement: Trinity A Distributed Defense Against Transient Spam-bots

Transient spam-bots are hijacked computers that are connected to the Internet for short periods of time, during which they send large amounts of spam. These spam-bots have become a principle source of spam; against which, static countermeasures such as DNS Black Lists are largely ineffective, and content-based filters provide only temporary relief without ongoing tuning and upgrading—a neverend...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JSW

دوره 9  شماره 

صفحات  -

تاریخ انتشار 2014