Analyzing DoS-Resistance of Protocols Using a Cost-Based Framework
نویسنده
چکیده
This paper addresses protocol susceptibility to denial-of-service attacks. We analyze protocol fragments using Meadows’s cost-based framework [9] to identify sequences of actions that render servers disabled, either due to memory or CPU exhaustion. In particular, we show that the JFK protocol [1] is DoS-resistant when bogus messages are handled in an appropriate way. We also discuss the relationship between the protocol properties fail-stop [7] and non-interference [5] and DoS-susceptibility.
منابع مشابه
Protocol Engineering for Protection against Denial-of-Service Attacks
Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service unavailability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries flood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a si...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملCost-based and Time-based Analysis of DoS-resistance in HIP
We develop a formal model of the Host Identity Protocol (HIP) based on Timed Coloured Petri Nets (Timed CPNs) and use a simulation approach provided in CPN Tools to achieve a formal analysis. We aim to examine unbalanced computation that leads to resource exhaustion attacks in key exchange protocols comparing among a legitimate initiator, four types of adversary who attempt to deny the service ...
متن کاملEnhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملA Foundation for Tunnel-complex Protocols
A FOUNDATION FOR TUNNEL-COMPLEX PROTOCOLS Alwyn E. Goodloe Carl A. Gunter Tunnel-complex protocols construct different tunnel topologies by directing tunnelestablishment protocols to set up pair-wise tunnels between different nodes, where the resulting tunnel complex satisfies some security requirement such as negotiating a defense in depth. Such protocols ease the burden on network managers de...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002