Combating spam and denial-of-service attacks with trusted puzzle solvers

被引:0
|
作者
Tsang, Patrick P. [1 ]
Smith, Sean W. [1 ]
机构
[1] Dartmouth Coll, Dept Comp Sci, Hanover, NH 03755 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptographic puzzles can be used to mitigate spam and denial-of-service (DoS) attacks, as well as to implement timed-release cryptography. However, existing crypto puzzles are impractical because: (1) solving them wastes computing resources and/or human time, (2) the time it takes to solve them can vary dramatically across computing platforms, and/or (3) applications become non-interoperable due to competition for resources when solving them. We propose the use of Trusted Computing in constructing crypto puzzles. Our puzzle constructions have none of the drawbacks above and only require each client machine to be equipped with a small tamper-resistant Trusted Puzzle Solver (TPS), which may be realized using the prevalent Trusted Platform Module (TPM) with minimal modifications.
引用
收藏
页码:188 / 202
页数:15
相关论文
共 50 条
  • [1] Defending against denial-of-service attacks with puzzle auctions
    Wang, XF
    Reiter, MK
    [J]. 2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, : 78 - 92
  • [2] Adaptive client puzzle scheme against denial-of-service attacks
    Chen, Rui-Chuan
    Guo, Wen-Jia
    Tang, Li-Yong
    Chen, Zhong
    [J]. Ruan Jian Xue Bao/Journal of Software, 2009, 20 (09): : 2558 - 2573
  • [3] Denial-of-service attacks
    Neumann, PG
    [J]. COMMUNICATIONS OF THE ACM, 2000, 43 (04) : 136 - 136
  • [4] Analysis of denial-of-service attacks on denial-of-service defensive measures
    Wang, BT
    Schulzrinne, H
    [J]. GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, : 1339 - 1343
  • [5] Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks
    Wu, Yongdong
    Zhao, Zhigang
    Bao, Feng
    Deng, Robert H.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (01) : 168 - 177
  • [6] Detection of Denial-of-service Attacks
    Anh Quang Tran
    [J]. 计算机工程, 2002, (S1) : 86 - 91
  • [7] Denial-of-Service Attacks to UMTS
    Bertino, Elisa
    [J]. COMPUTER, 2015, 48 (02) : 6 - 6
  • [8] Denial-of-Service Attacks on LoRaWAN
    van Es, Eef
    Vranken, Harald
    Hommersom, Arjen
    [J]. 13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [9] Combating channel eviction triggering denial-of-service attacks in cognitive radio networks
    Sodagari, Shabnam
    Attar, Alireza
    Leung, Victor C. M.
    Bilen, Sven G.
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2012, 23 (05): : 454 - 465
  • [10] Investigation of Simple Denial-of-Service Attacks
    Voitovych, Olesya
    Baryshev, Yurii
    Kolibabchuk, Eduard
    Kupershtein, Leonid
    [J]. 2016 THIRD INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), 2016, : 145 - 148