IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

IP Layer Client Puzzles: A Cryptographic Defense against DDoS Attack

IP Layer Client Puzzles: A Cryptographic Defense against DDoS Attack
View Sample PDF
Author(s): Genti Daci (Polytechnic University of Tirana, Albania)and Rezarta Jaupi (Polytechnic University of Tirana, Albania)
Copyright: 2013
Pages: 12
Source title: Enterprise Business Modeling, Optimization Techniques, and Flexible Information Systems
Source Author(s)/Editor(s): Petraq Papajorgji (Universiteti Europian i Tiranes, Albania), Alaine Margarete Guimarães (State University of Ponta Grossa, Brazil)and Mario R. Guarracino (Italian National Research Council, Italy)
DOI: 10.4018/978-1-4666-3946-1.ch002

Purchase

View IP Layer Client Puzzles: A Cryptographic Defense against DDoS Attack on the publisher's website for pricing and purchasing information.

Abstract

It is very common today that many business models are based on offering on-line services. Profitability and efficiency of this business model relies on a secure and undisturbed Internet infrastructure. Unfortunately, services offered on Internet infrastructure, being an Open and yet untrusted network, are very often targets of Denial-of-Service and Distributed Denial-of-Service attacks. These attacks are today a serious problem for on-line services offered by many business models. Preventing or minimizing DoS and DDoS is a difficult task which could serve to many on-line service offering business models to provide quality services to their clients. The main objective of this chapter is to present the Client Puzzle mechanism as a new method designed to defend business networks and their on-line services from these attacks. By using a client puzzle protocol on the IP level, the client is forced to solve a cryptographic puzzle before it can request any operation from a server, thus creating computational efforts and delays to illegitimate attackers and minimizing their attack effects on services. In this chapter, the authors show that chained puzzle protocol reduces the network and insfrastructure overhead because the servers do not have to generate puzzles on a per-packet basis. In addition, the chapter analyzes the effectiveness and some limitations of chained puzzles method with regards to minimizing DDoS attacks and outlines a general approach for addressing the identified limitations. At the last part, the authors propose a solution based on the general principle that under attack legitimate clients should be willing to experience some degradation in their performance in order to obtain the requested service.

Related Content

Margee Hume, Paul Johnston. © 2017. 19 pages.
Jessy Nair, D. Bhanu Sree Reddy. © 2017. 27 pages.
Joseph R. Muscatello, Diane H. Parente, Matthew Swinarski. © 2017. 19 pages.
Klaus Wölfel. © 2017. 33 pages.
Rui Pedro Marques. © 2017. 21 pages.
Ebru E. Saygili, Arikan Tarik Saygili. © 2017. 17 pages.
Aparna Raman, D. P. Goyal. © 2017. 41 pages.
Body Bottom