首页> 外文会议>International Workshop on Security Protocols >Guaranteeing Access in Spite of Distributed Service-Flooding Attacks
【24h】

Guaranteeing Access in Spite of Distributed Service-Flooding Attacks

机译:保证访问尽管分布式服务泛滥攻击

获取原文

摘要

We argue that open networks designed using end-to-end arguments are particularly vulnerable to flooding, and that this vulnerability persists as hardware and operating systems technologies advance. An effective end-to-end approach to counter distributed flooding attacks against public services and provide access guarantees to their clients is to establish and enforce "user agreements" among clients outside the public services they access. Among the user agreements designed to protect servers from flooding attacks, those requiring client proofs of work (e.g., client puzzles using hash functions) are both ineffective and unnecessary whenever strong access guarantees are desired. In contrast, simple rate-control agreements can be defined to provide strong guarantees based on waiting-time limits. These agreements are established by special-purpose servers and verified before request processing at network-line rate, and hence cannot be flooded.
机译:我们争辩说,使用端到端参数设计的开放网络尤其容易受到洪水,并且此漏洞仍然存在作为硬件和操作系统技术的进步。对公共服务分配分布式洪水攻击的有效端到端方法,并为客户提供访问保证是在他们访问的公共服务之外的客户端建立和执行“用户协议”。在旨在保护服务器免受洪水攻击的用户协议之中,那些需要客户工作证明的人(例如,使用哈希函数的客户端拼图)既不是无效的,只要需要强大的访问保证就不必要。相比之下,可以定义简单的速率控制协议,以基于等候限制提供强担保。这些协议是由专用服务器建立的,并在要求在网络线速率进行请求处理之前进行验证,因此不能淹没。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号