首页> 外文会议>Simulation Multiconference >Using Identity-Based Privacy-Protected Access Control Filter (IPACF) To Against Denial of Service Attacks and Protect User Privacy
【24h】

Using Identity-Based Privacy-Protected Access Control Filter (IPACF) To Against Denial of Service Attacks and Protect User Privacy

机译:使用基于身份的隐私权保护的访问控制滤波器(IPACF)以防止拒绝服务攻击并保护用户隐私

获取原文

摘要

Denial of service (DoS)/Distributed DoS (DDoS) attack is an eminent threat to an authentication server, which is used to guard access to firewalls, virtual private networks and wired/wireless networks. The major problem is that an authentication server needs to verify whether a request is from a legitimate user and if intensive computation and/or memory resources are needed for verifying a request, then DoS/DDoS attack is feasible. In this paper, a new protocol called Identity-Based Privacy-Protected Access Control Filter (IPACF) is proposed to counter DoS/DDoS attack. This protocol is an improvement of IDF (Identity-Based Dynamic Access Control Filter). The proposed protocol is stateless because it does not create a state for an authentication request unless the request is from a legitimate user. Moreover, the IPACF is stateless for both user and authentication server since a user and responder authenticate each other. A filter value, which is generated by pre-shared secrets, is sent in a frame and checked to see if the request is legitimate. Note that the process of checking filter value is not intensive computation. The filter value is tabulated in a table with user identity so that a filter value represents a user's identity and only the legitimate user and authentication server can figure out the identity. When a filter value is from a legitimate source, a new filter value will be generated for the next frame. Consequently, the filter value is changed for every frame. Thus the privacy of both user and server are protected. The IPACF is implemented for both user and authentication server. The performance of the implementation is reported in this paper. In order to counter more DoS/DDoS attacks that issue fake requests, parallel processing technique is used to implement the authentication server, which is divided into server 1 and server 2. Server 1 only checks the validity of the request filter value against the filter value table. If the request is legitimate, the request will be passed to server 2 for generating a new filter value; otherwise, the fake request is rejected by server 1. The performance comparison of dual server and single server is also reported.
机译:拒绝服务(DoS)攻击/分布式拒绝服务(DDoS)攻击是到认证服务器,它是用来守卫访问防火墙,虚拟专用网和有线/无线网络的杰出威胁。主要的问题是,认证服务器需要验证一个请求是否来自一个合法用户,如果需要验证的请求密集型计算和/或存储资源,然后DoS / DDoS攻击是可行的。在本文中,一个新的协议被称为基于身份的隐私保护的访问控制过滤器(IPACF)提出了反DoS / DDoS攻击。此协议是IDF(基于身份的动态访问控制滤波器)的改进。所提出的协议是无状态,因为它不用于认证请求的创建的状态下,除非该请求是从一个合法用户。此外,IPACF是无状态的两个用户和认证服务器,因为用户和应答相互认证。的过滤器值,其通过预共享的秘密所产生,在一帧中被发送,并检查,以查看是否该请求是合法的。需要注意的是检查过滤器值的过程并不密集的计算。该过滤器的值与用户身份的表列,这样一个过滤器值代表一个用户的身份,只有合法用户和认证服务器可以计算出身份。当过滤器值是来自合法源,将用于下一帧来产生一个新的过滤器值。因此,过滤器值被改变为每一帧。因此,用户和服务器的隐私得到保护。该IPACF是为用户和认证服务器实现。执行的性能本文报道。为了计数器更DoS / DDoS攻击这一问题假请求,并行处理技术被用于实现认证服务器,其被分成服务器1和服务器2服务器1个仅检查靠在过滤器值的请求过滤器值的有效性桌子。如果该请求是合法的,则该请求将被传递到服务器2,用于产生一个新的过滤器值;否则,假请求由服务器1拒绝双服务器和单个服务器的性能比较还报道。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号