首页> 外文会议>Proceedings of the 2007 spring simulation multiconference(SpringSim'07) >Using Identity-Based Privacy-Protected Access Control Filter (IPACF) To Against Denial of Service Attacks and Protect User Privacy
【24h】

Using Identity-Based Privacy-Protected Access Control Filter (IPACF) To Against Denial of Service Attacks and Protect User Privacy

机译:使用基于身份的受隐私保护的访问控制过滤器(IPACF)来防止拒绝服务攻击并保护用户隐私

获取原文
获取原文并翻译 | 示例

摘要

Denial of service (DoS)/Distributed DoS (DDoS) attack is an eminent threat to an authentication server, which is used to guard access to firewalls, virtual private networks and wired/wireless networks. The major problem is that an authentication server needs to verify whether a request is from a legitimate user and if intensive computation and/or memory resources are needed for verifying a request, then DoS/DDoS attack is feasible. In this paper, a new protocol called Identity-Based Privacy-Protected Access Control Filter (IPACF) is proposed to counter DoS/DDoS attack. This protocol is an improvement of IDF (Identity-Based Dynamic Access Control Filter). The proposed protocol is stateless because it does not create a state for an authentication request unless the request is from a legitimate user. Moreover, the IPACF is stateless for both user and authentication server since a user and responder authenticate each other. A filter value, which is generated by pre-shared secrets, is sent in a frame and checked to see if the request is legitimate. Note that the process of checking filter value is not intensive computation. The filter value is tabulated in a table with user identity so that a filter value represents a user's identity and only the legitimate user and authentication server can figure out the identity. When a filter value is from a legitimate source, a new filter value will be generated for the next frame. Consequently, the filter value is changed for every frame. Thus the privacy of both user and server are protected.rnThe IPACF is implemented for both user and authentication server. The performance of the implementation is reported in this paper. In order to counter more DoS/DDoS attacks that issue fake requests, parallel processing technique is used to implement the authentication server, which is divided into server 1 and server 2. Server 1 only checks the validity of the request filter value against the filter value table. If the request is legitimate, the request will be passed to server 2 for generating a new filter value; otherwise, the fake request is rejected by server 1. The performance comparison of dual server and single server is also reported.
机译:拒绝服务(DoS)/分布式DoS(DDoS)攻击是对身份验证服务器的重大威胁,该身份验证服务器用于保护对防火墙,虚拟专用网络和有线/无线网络的访问。主要问题是身份验证服务器需要验证请求是否来自合法用户,并且如果需要大量的计算和/或内存资源来验证请求,则DoS / DDoS攻击是可行的。在本文中,提出了一种新的协议,称为基于身份的受隐私保护的访问控制过滤器(IPACF),以应对DoS / DDoS攻击。该协议是对IDF(基于身份的动态访问控制过滤器)的改进。提议的协议是无状态的,因为它不会为身份验证请求创建状态,除非该请求来自合法用户。而且,由于用户和响应者彼此进行身份验证,因此IPACF对于用户和身份验证服务器都是无状态的。由预共享机密生成的过滤器值将在帧中发送,并检查请求是否合法。注意,检查过滤器值的过程不是密集的计算。过滤器值用用户身份列表在表格中,以便过滤器值代表用户的身份,只有合法用户和身份验证服务器才能确定该身份。当过滤器值来自合法来源时,将为下一帧生成一个新的过滤器值。因此,滤波器值对于每一帧都改变。这样就保护了用户和服务器的隐私。rnIPACF为用户和身份验证服务器实现。本文报告了实现的性能。为了应对发出伪造请求的更多DoS / DDoS攻击,使用并行处理技术来实现认证服务器,该认证服务器分为服务器1和服务器2。服务器1仅根据过滤器值检查请求过滤器值的有效性。表。如果该请求是合法的,则该请求将被传递到服务器2以生成新的过滤器值;否则,假请求将被服务器1拒绝。还将报告双服务器和单服务器的性能比较。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号