Client Puzzles Based on Quasi Partial Collisions Against DoS Attacks in UMTS

被引:0
|
作者
Lei, Yaohui [1 ]
Pierre, Samuel [1 ]
Quintero, Alejandro [1 ]
机构
[1] Ecole Polytech, Dept Comp Engn, Mobile Comp & Networking Res Lab LARIM, Montreal, PQ H3T 1J4, Canada
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The UMTS system and architecture are designed to accommodate Internet-like mobile services and specific services like mobile commerce to mobile users. They bring attacks from Internet and mobile users as well. Denial-of-Service (DoS) attacks aim to frustrate a legitimate user's access to mobile services or bring down servers by depleting system resources. Many approaches are proposed to thwart these attacks. A client puzzle from the server, which forces the client to resolve it before communication, is one of these approaches. The server can adjust the difficulty levels of the puzzle for access control and against DoS attacks according to current resource consumption and communication scenario. Currently, many types of client puzzles have no fine-grained control over difficulties. In a client puzzle, the next higher difficulty level is often twice as hard as the current one. In this paper, we propose a method based on partial collisions in hash functions. Our approach provides fine-grained control over difficulties by introducing a quasi partial collision concept. The results obtained confirm the fine granularity and efficiency of our approach.
引用
收藏
页码:2464 / 2468
页数:5
相关论文
共 50 条
  • [1] Quantitative Analysis of DoS Attacks and Client Puzzles in IoT Systems
    Arnaboldi, Luca
    Morisset, Charles
    [J]. SECURITY AND TRUST MANAGEMENT (STM 2017), 2017, 10547 : 224 - 233
  • [2] Performance Evaluation of Non-parallelizable Client Puzzles for Defeating DoS Attacks in Authentication Protocols
    Tritilanunt, Suratose
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXIV, PROCEEDINGS, 2010, 6166 : 358 - 365
  • [3] CPU-based DoS attacks against SIP servers
    Luo, Ming
    Peng, Tao
    Leckie, Christopher
    [J]. 2008 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, VOLS 1 AND 2, 2008, : 41 - 48
  • [4] Dynamic Multimedia Scheduling against Motion based DoS Attacks
    Choo, Euijin
    Lee, Heejo
    Lee, Wan Yeon
    [J]. ICOIN: 2009 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, 2009, : 200 - +
  • [5] Regional-based Authentication Against DoS Attacks in Wireless Networks
    Martinovic, Ivan
    Zdarsky, Frank A.
    Schmitt, Jens B.
    [J]. Q2SWINET'07: PROCEEDINGS OF THE THIRD ACM WORKSHOP ON Q2S AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2007, : 176 - 179
  • [6] A Router Based Packet Filtering Scheme for Defending Against DoS Attacks
    Lu Ning
    Su Sen
    Jing Maohua
    Han Jian
    [J]. CHINA COMMUNICATIONS, 2014, 11 (10) : 136 - 146
  • [7] A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
    Wei, Wei
    Chen, Feng
    Xia, Yingjie
    Jin, Guang
    [J]. IEEE COMMUNICATIONS LETTERS, 2013, 17 (01) : 173 - 175
  • [8] Evaluating DoS Attacks Against SIP-Based VoIP Systems
    Rafique, M. Zubair
    Akbar, M. Ali
    Farooq, Muddassar
    [J]. GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 6130 - 6135
  • [9] A Novel WLAN Client Puzzle against DoS Attack Based on Pattern Matching
    Ordi, Ali
    Zamani, Mazdak
    Idris, Norbik Bashah
    Manaf, Azizah Abdul
    Abdullah, Mohd Shahidan
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2015, 2015
  • [10] A new biometric identity based encryption scheme secure against DoS attacks
    Sarier, Neyire Deniz
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (01) : 23 - 32