Design and implementation of network puzzles

作者: Wu-chang Feng , E. Kaiser , Wu-chi Feng , A. Luu

DOI: 10.1109/INFCOM.2005.1498523

关键词: Routing protocolDenial-of-service attackComputer networkThe InternetCryptographyDistributed computingComputer scienceNetwork layerLayer (object-oriented design)Fast pathService (systems architecture)

摘要: … design and implementation of network layer puzzles. There are two key properties of our design; a protocol which supports the issuance of puzzles … fine-grained puzzle mechanism that …

参考文章(45)
Vern Paxson, Stuart Staniford, Nicholas Weaver, How to Own the Internet in Your Spare Time usenix security symposium. pp. 149- 167 ,(2002)
Scott A. Crosby, Dan S. Wallach, Denial of service via algorithmic complexity attacks usenix security symposium. pp. 3- 3 ,(2003)
David G. Andersen, Mayday: distributed filtering for internet services usenix symposium on internet technologies and systems. pp. 3- 3 ,(2003)
Virgil D. Gligor, Guaranteeing Access in Spite of Distributed Service-Flooding Attacks Security Protocols. pp. 97- 105 ,(2005) , 10.1007/11542322_13
Cynthia Dwork, Moni Naor, Pricing via Processing or Combatting Junk Mail international cryptology conference. pp. 139- 147 ,(1992) , 10.1007/3-540-48071-4_10
Luis von Ahn, Manuel Blum, Nicholas J. Hopper, John Langford, CAPTCHA: using hard AI problems for security theory and application of cryptographic techniques. pp. 294- 311 ,(2003) , 10.1007/3-540-39200-9_18
Nick Feamster, Kevin Fu, Emil Sit, Kendra Smith, Dos and don'ts of client authentication on the web usenix security symposium. pp. 19- 19 ,(2001)
R. L. Rivest, D. A. Wagner, A. Shamir, Time-lock Puzzles and Timed-release Crypto Massachusetts Institute of Technology. ,(1996)
Martin Roesch, Snort - Lightweight Intrusion Detection for Networks usenix large installation systems administration conference. pp. 229- 238 ,(1999)