MITIGATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS BY USING SOFTWARE PUZZLE
|
|
|
- Julia Holt
- 9 years ago
- Views:
Transcription
1 MITIGATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS BY USING SOFTWARE PUZZLE Mrs. Suganya K, Mr. Britto Dennis J, Ms. Hamna Farhan P C PG Scholar, Dept. of.cse(with specialization in networks)., Dhanalakshmi Srinivasan Engineering College, Professor, Dept. of Information Technology., Dhanalakshmi Srinivasan Engineering College,Tamilnadu,India PG Scholar, Dept. of.cse (with specialization in networks)., Dhanalakshmi Srinivasan Engineering College, Tamilnadu,India ********** Abstract - Denial of Service (DoS) attack and bogus requests. For example, a malicious client sends a Distributed Denial of Service (DDoS) attack on the large number of garbage requests to an HTTPS bank Internet aim to prevent legitimate clients from accessing a server. As the server has to spend a lot of CPU time in service and are considered a serious threat to the completing SSL handshakes, it may not have sufficient availability and reliability of the Internet services. Client resources left to handle service requests from its puzzle is a well-known countermeasure, which demands a customers, resulting in lost businesses and reputation [1]. client to perform computationally expensive operations DoS and DDoS are effective if attackers spend much less before being granted services from a server. However, an resources than the victim server or are much more attacker can inflate its capability of DoS/DDoS attacks powerful than normal users. In the example above, the with fast puzzle- solving software and/or built-in graphics attacker spends negligible effort in producing a request, processing unit (GPU) hardware to significantly weaken but the server has to spend much more computational the effectiveness of client puzzles. A new puzzle scheme effort in HTTPS handshake. In this case, conventional called software puzzle is introduced to prevent DoS/DDoS cryptographic tools do not enhance the availability of the attackers from inflating their puzzle-solving capabilities. services; in fact, they may degrade service quality due to Unlike the existing client puzzle schemes, which publish expensive cryptographic operations. A client puzzle can their puzzle algorithms in advance, a puzzle algorithm in significantly reduce the impact of DoS attack because it the present software puzzle scheme is randomly generated enables a server to spend much less time in handling the only after a client request is received at the server side and bulk of malicious requests. the algorithm is generated. Software puzzle aims at an attacker is unable to prepare an implementation to solve the puzzle in advance and the attacker needs considerable effort in translating a central processing unit puzzle software to its functionally equivalent GPU version such that the translation cannot be done in real time. Key Words: DDoS, client puzzle, software puzzle, GPU programming. 1. INTRODUCTION Internet based technologies have revolutionized the banking industry as well as way people interact with financial institution and one another financially. However, it has raised new questions and dimensions for securing data of the financial institutions as well as the end-users. Denial of Service (DoS) attacks and Distributed DoS (DDoS) attacks attempt to deplete an online service s resources such as network bandwidth, memory and computation power by overwhelming the service with Hash-reversal is an important client puzzle scheme which increases a client cost by forcing the client to crack a one-way hash instance. Technically, in the puzzle generation step, given a public puzzle function P derived from one-way functions such as SHA-1 or block cipher AES, a server randomly chooses a puzzle challenge x, and sends x to the client. In the puzzle-solving and verification steps, the client returns a puzzle response (x, y), and if the server confirms x = P(y), the client is able to obtain the service from the server. In this hash-reversal puzzle scheme, a client has to spend a certain amount of time tc in solving the puzzle (i.e., finding the puzzle solution y), and the server has to spend time ts in generating the puzzle challenge x and verifying the puzzle solution y. Since the server is able to choose the challenge such that tc _ ts for normal users, i.e., γ _ 1, an attacker cannot start DoS attack efficiently by solving many puzzles. Alternatively, the attacker can merely reply to the server with an arbitrary number y so as to exhaust the server s time for verification. In this case, although γ < 1 such that defense effect of client puzzle is weakened, the 2016, IRJET Impact Factor value: 4.45 ISO 9001:2008 Certified Journal Page 1347
2 server time ts is still much smaller than the service preparation time (e.g., RSA decryption) or service time (e.g., database process) as the returned answer will be rejected at a high probability. Of course, optimizing the puzzle verification mechanism is very important and doing so will undoubtedly improve the server s performance. However, an attacker can easily utilize the free GPUs or integrated CPU-GPU to inflate his computational capacity. This renders the existing client puzzle schemes ineffective due to the significantly decreased computational cost ratio. For example, an attacker may amortize one puzzle-solving task to hundreds of GPU cores if the client puzzle function is parallelizable or the attacker may simultaneously send to the server many requests and ask every GPU core to solve one received puzzle challenge independently if the puzzle function is non-parallelizable. As the present browsers such as Microsoft Internet Explorer and Firefox do not explicitly support client puzzle schemes, Kaiser and Feng [2] developed a web-based client puzzle scheme which focuses on transparency and backwards compatibility for incremental deployment. The scheme dynamically embeds client-specific challenges in webpages, transparently delivers server challenges and client responses. However, this scheme is vulnerable to DoS attackers who can implement the puzzle function in realtime. Technically, an attacker can rewrite the puzzle function P( ) with a native language such as C/C++ such that the cost of an attacker is much smaller than that the server expects.3 Even worse, a GPU-inflated DoS attacker can realize the fast software implementation on the many-core GPU hardware and run the software in all the GPU cores simultaneously such that it is easy to defeat the web-based client puzzle scheme Many researches focus on reduce the effect of DoS/DDoS attacks and add a difficulty to solve the puzzle by an attacker. Software puzzle is proposed to mitigate the effects of DoS and DDoS attacks. Software puzzle aims to deter an adversary from understanding or translating the implementation of a random puzzle function. That is to say, unlike a data puzzle challenge which includes a challenge data only, a software puzzle challenge includes dynamically generated software, which including a data puzzle function as a component. Although a software puzzle scheme does not publish the puzzle function in advance, because an adversary knows the algorithm for constructing software puzzles. 2.1 Existing System Client puzzle schemes which publish a puzzle function in advance, the software puzzle scheme dynamically generates the puzzle function P( ) in the form of a software core C upon receiving a client s request. Specifically, by extending DCG technology which produces machine instructions at runtime [10], the proposed scheme randomly chooses a set of basic functions, assembles them together into the puzzle core C, constructs a software puzzle C0x with the puzzle core C and a random challenge x. If the server aims to defeat high-level attackers who are able to reverse-engineer software. Client puzzle schemes assume that the malicious client solves the puzzle using legacy CPU resource only. This assumption is not always true. Presently, the many-core GPU (Graphic Processing Unit) component is almost a standard configuration in modern desktop computers(e.g., ATI FirePro V3750 in Dell T3500), laptop computer (e.g., nvidia Quadro FX 880M in Lenovo Thinkpad W510), and even smartphones (e.g., PowerVR SGX540 in Samsung I9008 GalaxyTM S). Therefore, an attacker can easily utilize the free GPUs or integrated CPU-GPU to inflate his computational capacity [5]. This renders the existing client puzzle schemes ineffective due to the significantly decreased computational cost ratio γ. For example, an attacker may amortize one puzzle-solving task to hundreds of GPU cores if the client puzzle function is parallelizable (e.g., the hash reversal puzzle), or the attacker may simultaneously send to the server many requests and ask every GPU core to solve one received puzzle challenge independently if the puzzle function is non-parallelizable (e.g. modular square root puzzle [7] and Time-lock puzzle [8]). This parallelism strategy can dramatically reduce the total puzzle-solving time, and hence increase the attack efficiency. Green et al. [6] examined various GPU-inflated DoS attacks, and showed that attackers can use GPUs to inflate their ability to solve typical reversal based puzzles by a factor of more than 600. Moreover, in order to defeat GPU-inflated DoS attack to client puzzles, they proposed to track the individual client behavior through client s IP address [9]. Problems Identified: A client has to spend a certain amount of time tc in solving the puzzle (i.e., finding the puzzle solution y) 2. SYSTEM MODEL In this section we consider the existing system design and the proposed system. The server has to spend time ts in generating the puzzle challenge x and verifying the puzzle solution y 2016, IRJET Impact Factor value: 4.45 ISO 9001:2008 Certified Journal Page 1348
3 The existing client puzzle schemes assume that the malicious client solves the puzzle using legacy CPU resource only Fig 1: software puzzle generated with secret key and nonce sn. 2.2 Proposed System A new type of client puzzle, called software puzzle is defend against GPU-inflated DoS and DDoS attacks. Unlike the existing client puzzle schemes which publish a puzzle function in advance, the software puzzle scheme dynamically generates the puzzle function P( ) in the form of a software core C upon receiving a client s request. The proposed scheme randomly chooses a set of basic functions, assembles them together into the puzzle core C, constructs a software puzzle C0x with the puzzle core C and a random challenge x. If the server aims to defeat high-level attackers who are able to reverseengineer software, it will obfuscate C0x into an enhanced software puzzle. After receiving the software puzzle sent from the server, a client tries to solve the software puzzle on the host CPU, and replies to the server, as the conventional client puzzle scheme does. However, a malicious client may attempt to offload the puzzle-solving task into its GPU. In this case, the malicious client has to translate the CPU software puzzle into its functionally equivalent GPU version because GPU and CPU have totally different instruction sets for different application. Benefits: Software puzzle prevent GPU from being used in the puzzle-solving process based on different instruction sets and real-time environments Easily deployed as the present client puzzle schemes do. Random puzzle with random algorithm at each time. 3. CODE BLOCK WAREHOUSE CONSTRUCTION The code block warehouse W stores compiled instruction blocks. The purpose to store compiled codes rather than source codes is to save server s time; otherwise, the server has to take extra time to compile source codes into compiled codes in the process of software puzzle generation. The intuitive requirements for each block are In order to assemble the code blocks together each block has well-defined input parameters and output parameters such that the output from one block can be used as the input of the following blocks. The size of each code block is decided by the security parameter κ. Given that the size of software puzzle is constant, if the block size is smaller, there are more blocks on average such that more puzzles can be constructed. 3.1 CPU-Only Instruction Block Unlike CPU, GPU is designed for the predictable graphic processing such as matrix operations, not generic logic processing. As branching operations (e.g., try-catchfinally, goto) are inherently non-predictable and are nonparallelable, executing them in GPU is slow such that the major merit of GPU cannot be exploited by the attacker. TABLE I EXAMPLE CPU-ONLY INSTRUCTIONS Instruction Difference exploited Read local cookie GPU cannot directly read CPU storage Allocate large GPU has much smaller memory memory than CPU Try-catch GPU does not support except handling Goto (address) GPU does not support branch Create new class GPU does not support dynamic class 3.2 Data Puzzle Algorithm Block Similar to the blocks in data puzzle, algorithm blocks perform the mathematical operations only. For example, in an AES round, ShiftRows code block outputs a transformed message matrix (or state), which can be used as input of any other operation such as MixColumn code block without incurring parameter mismatch errors. 2016, IRJET Impact Factor value: 4.45 ISO 9001:2008 Certified Journal Page 1349
4 4. SOFTWARE PUZZLE GENERATION In order to construct a software puzzle, the server has to execute three modules: puzzle core generation, puzzle challenge generation, software puzzle encrypting/obfuscating. 4.1 Puzzle core generation From the code block warehouse, the server first chooses n code blocks based on hash functions and a secret, e.g., the j th instruction block bi j, where i j = H1(y, j ), and y = H2(key, sn), with one-way functions H1( ) and H2( ), key is the server s secret, and sn is a nonce or timestamp. All the chosen blocks are assembled into a puzzle core, denoted as C( ) = (bi1 ; bi2 ; ; bin ). 4.2 Puzzle Challenge Generation Given some auxiliary input messages such as IP addresses, and in-line constants, the server calculates a message m from public data such as their IP addresses, port numbers and cookies, and produces a challenge x = C(y,m), similar to encrypting plaintext m with key y to produce cipher text x. As the attacker does not know the puzzle core C( ) (or equivalently the puzzle function P( )) in advance, it cannot exploit GPU to solve the puzzle C0x in real time using the basic GPU-inflated DoS attack addressed. Nonetheless, if the puzzle is merely constructed as above, it is possible for an attacker to generate the GPU kernel by mapping the CPU instructions in C0x to the GPU instructions one by one, i.e., to automatically translate the CPU software puzzle C0x into its functionally equivalent GPU version. 4.3 Code Protection Code obfuscation is able to thwart the above translation threat to some extent. Though there are no generic obfuscation techniques which can prevent a patient and advanced hacker from understanding a program in theory [3], results in [4] show that obfuscation does increase the cost of reverse-engineering. Thus, although code obfuscation may be not satisfactory in long-term software defense against hacking, it is suitable for fortifying software puzzles which demand a protection period of several seconds only. A software puzzle consists of instructs, and each instruction has a form (opcode, [operands]), where opcode indicates which operation (e.g., addition, shift, jump) is, while the operands, varying with opcode, are the parameters (e.g., target address of jump instruction) to complete the operations. As a popular obfuscation technology, code encryption technology treats software code as data string and encrypts both operand and opcode. Concretely, given the code C0x, the server generates an encrypted puzzle C1x = E(y, C0x), where E( ) is a cipher such as AES, and y is used as the encryption key. In practice, there are many commercial code obfuscation tools for C/C++ software such as VMprotect ( which can be used to protect the software puzzle from hacking. 5. SECURITY ANALYSIS Software puzzle aims to prevent GPU from being used in the puzzle-solving process based on different instruction sets and real-time environments between GPU and CPU. Conversely, an adversary may attempt to deface the software puzzle scheme by simulating the host on GPU, cracking puzzle algorithm, re-producing GPU-version puzzle, or abusing the access priority in puzzle-solving. Employing Host Simulator on GPU: If an attacker is able to run a CPU simulator over GPU environment, the software puzzle can be executed on GPU directly. 5.1 Deobfuscating Software Code Generally, dynamic translation can accelerate the attacking speed, but it is not very helpful to the GPUinflated DoS attacker because Dynamic translation is usually a humanmachine interactive process. If human interference is required, the DoS attack is very ineffective. In order to carry on the dynamic translation, the attacker needs a simulation environment for debugging the software puzzle. In the translation process, the decryption key y has to be tested by brute force. Because it is impossible to decide whether a tested key is right based on the recovered opcode value; the attacker has to run the puzzle _C0x for every key test to make the decision. If the simulation environment is run on CPU host, the host cannot generate the GPU kernel until the solution is found. Therefore, this translation time is longer than the time used to directly solve software puzzle by CPU host. In other words, the GPU is useless for accelerating puzzle-solving in this case. If the simulator is run on GPU, the attacker has to face the troubles stated in Subsection V-A besides the trouble existing in the above CPU simulation environment. Once the translated code has one error, the attacker fails to recover the software puzzle C0x to find the correct response such that he cannot launch DoS attack. Therefore, it is not easy for an attacker to develop a GPU 2016, IRJET Impact Factor value: 4.45 ISO 9001:2008 Certified Journal Page 1350
5 kernel for solving the original software puzzle by deobfuscating/analyzing software puzzle. 5.2 Abusing Access Priority All the client puzzle schemes assume that there is no secure channel between the client and the server until puzzle verification completion. Otherwise, the client puzzle scheme is redundant. Thus, an attacker can intercept all the traffic between the client and the server, and start man-in-the-middle attack, say, sending malicious software puzzles to the client browser so as to launch attacks to the clients. However, an access policy should be defined so as to enable the software puzzle to call some special class generation functions. Hence, the attacker may have extra right to create new classes to make troubles to the clients. Luckily, this flaw does not really incur any new threat to the client host. As any new class created from the attacker has the same priority as the original one, i.e., the same as normal class except class generation permission, it cannot access any other extra resources in the host platform. Nonetheless, this class generation permission enables the attacker to deplete the memory resource of the local host by creating infinite number of classes. But this memory DoS attack to local host also exists in the legal Applet which requests for a large amount of memory. Hence, the adversary is unable to incur new threat to the host by abusing the extra priority. 6. CONCLUSION Software puzzle scheme is proposed for defeating GPUinflated DoS attack. It adopts software protection technologies to ensure challenge data confidentiality and code security for an appropriate time period. Hence, it has different security requirement from the conventional cipher which demands long-term confidentiality only, and code protection which focuses on long-term robustness against reverse-engineering only. Since the software puzzle may be built upon a data puzzle, it can be integrated with any existing server-side data puzzle scheme, and easily deployed as the present client puzzle schemes do. REFERENCES [1] Jun J. Larimer. (Oct. 28, 2014). Pushdo SSL DDoS Attacks. [Online] Available : [2] E. Kaiser and W.-C. Feng, mod_kapow: Mitigating DoS with transparent proof-of-work, in Proc. ACM CoNEXT Conf., 2007, p. 74. [3] B. Barak et al., On the (Im)possibility of obfuscating programs, in Advances in Cryptology (Lecture Notes in Computer Science), vol Berlin, Germany: Springer-Verlag, 2001, pp [4] H.-Y. Tsai, Y.-L. Huang, and D. Wagner, A graph approach to quantitative analysis of control-flow obfuscating transformations, IEEE Trans. Inf. Forensics Security, vol. 4, no. 2, pp [5] R. Shankesi, O. Fatemieh, and C. A. Gunter, Resource inflation threats to denial of service countermeasures, Dept. Comput. Sci., UIUC, Champaign, IL, USA, Tech. Rep., Oct [Online] Available: [6] J. Green, J. Juen, O. Fatemieh, R. Shankesi, D. Jin, and C. A. Gunter, Reconstructing Hash Reversal based Proof of Work Schemes, in Proc. 4th USENIX Workshop Large-Scale Exploits Emergent Threats, [7] Y. I. Jerschow and M. Mauve, Non-parallelizable and non-interactive client puzzles from modular square roots, in Proc. Int. Conf. Availability,Rel. Secur., Aug. 2011, pp [8] R. L. Rivest, A. Shamir, and D. A. Wagner, Timelock puzzles and timed-release crypto, Dept. Comput. Sci., Massachusetts Inst. Technol., Cambridge, MA, USA, Tech. Rep. MIT/LCS/TR-684, Feb [Online]. Available : psu.edu/viewdoc/summary?doi= [9] W.-C. Feng and E. Kaiser, The case for public work, in Proc. IEEE Global Internet Symp., May 2007, pp [10] D. Keppel, S. J. Eggers, and R. R. Henry, A case for runtime code generation, Dept. Comput. Sci. Eng., Univ. Washington, Seattle, WA, USA, Tech. Rep. CSE , [11] E. Kaiser and W.-C. Feng, mod_kapow: Mitigating DoS with transparent proof-of-work, in Proc. ACM CoNEXT Conf., 2007, p. 74. [12] NVIDIA CUDA. (Apr. 4, 2012). NVIDIA CUDA C Programming Guide,Version 4.2. [Online]. Available: [13] X. Wang and M. K. Reiter, Mitigating bandwidthexhaustion attacks using congestion puzzles, in 2016, IRJET Impact Factor value: 4.45 ISO 9001:2008 Certified Journal Page 1351
6 Proc. 11th ACM Conf. Comput. Commun. Secur., 2004, pp [14] M. Jakobsson and A. Juels, Proofs of work and bread pudding protocols, in Proc. IFIP TC6/TC11 Joint Working Conf. Secure Inf. Netw., Commun. Multimedia Secur., 1999, pp [15] D. Kahn, The Codebreakers: The Story of Secret Writing, 2nd ed.new York, NY, USA: Scribners, 1996, p , IRJET Impact Factor value: 4.45 ISO 9001:2008 Certified Journal Page 1352
Software Puzzle Counterstrike for Denial of Service Attack
Software Puzzle Counterstrike for Denial of Service Attack Deepu. S. D, Dr. Ramakrishna. M.V 4th Sem M.Tech Student, Department of ISE, SJBIT, Bangalore, India Professor, Department of ISE, SJBIT, Bangalore,
Analysis on Some Defences against SYN-Flood Based Denial-of-Service Attacks
Analysis on Some Defences against SYN-Flood Based Denial-of-Service Attacks Sau Fan LEE (ID: 3484135) Computer Science Department, University of Auckland Email: [email protected] Abstract A denial-of-service
A SIP based VOIP to avoid Vulnerabilities in designing VOIP network in Enterprise
A SIP based VOIP to avoid Vulnerabilities in designing VOIP network in Enterprise K.Subhash Bhagavan #1, Kirankumar.P #2, MVSS Nagendranath#3, #1 Student, Sasi Institute of Technology and Engineering,
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS Kanchupati Kondaiah 1, B.Sudhakar 2 1 M.Tech Student, Dept of CSE,
Index Terms Denial-of-Service Attack, Intrusion Prevention System, Internet Service Provider. Fig.1.Single IPS System
Detection of DDoS Attack Using Virtual Security N.Hanusuyakrish, D.Kapil, P.Manimekala, M.Prakash Abstract Distributed Denial-of-Service attack (DDoS attack) is a machine which makes the network resource
DoS: Attack and Defense
DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches
ptcp: A Client Puzzle Protocol For Defending Against Resource Exhaustion Denial of Service Attacks
ptcp: A Client Puzzle Protocol For Defending Against Resource Exhaustion Denial of Service Attacks Timothy J. McNevin, Jung-Min Park, and Randolph Marchany {tmcnevin, jungmin, marchany}@vt.edu Advanced
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 3, Issue.
DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR
Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India [email protected],
The Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [email protected] Abstract. In this report, we point out a serious security flaw in Microsoft
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Application Denial of Service Is it Really That Easy?
Application Denial of Service Is it Really That Easy? Shay Chen Agenda Introduction to Denial of Service Attacks Application Level DoS Techniques Case Study Denial of Service Testing Mitigation Summary
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT K.karthika 1, M. Daya kanimozhi Rani 2 1 K.karthika, Assistant professor, Department of IT, Adhiyamaan College of Engineering, Hosur
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler [email protected] Mentor: Professor Chris Gregg Abstract Modern day authentication systems
Multi-Channel DDOS Attack Detection & Prevention for Effective Resource Sharing in Cloud
Multi-Channel DDOS Attack Detection & Prevention for Effective Resource Sharing in Cloud 1 J. JANCYRANI, 2 B. NITHIA 1 PG scholar, Department Of Computer Science and Engineering, Surya school of engineering
Signature Amortization Technique for Authenticating Delay Sensitive Stream
Signature Amortization Technique for Authenticating Delay Sensitive Stream M Bruntha 1, Dr J. Premalatha Ph.D. 2 1 M.E., 2 Professor, Department of Information Technology, Kongu Engineering College, Perundurai,
Chapter 10. Cloud Security Mechanisms
Chapter 10. Cloud Security Mechanisms 10.1 Encryption 10.2 Hashing 10.3 Digital Signature 10.4 Public Key Infrastructure (PKI) 10.5 Identity and Access Management (IAM) 10.6 Single Sign-On (SSO) 10.7 Cloud-Based
Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.
Protection of Vulnerable Virtual machines from being compromised as zombies during DDoS attacks using a multi-phase distributed vulnerability detection & counter-attack framework Ashok Kumar Gonela MTech
Index Terms: Cloud Computing, Cloud Security, Mitigation Attack, Service Composition, Data Integrity. 1. Introduction
Real-Time Service Composition and Deployment for Secure Computing in Cloud Environment R. Ushadevi 1, V. Rajamani 2 1 Research Scholar, Department of Computer Applications, St. Peter s University, Chennai
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Electronic Contract Signing without Using Trusted Third Party
Electronic Contract Signing without Using Trusted Third Party Zhiguo Wan 1, Robert H. Deng 2 and David Lee 1 Sim Kim Boon Institute for Financial Economics 1, School of Information Science 2, Singapore
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN Kanika 1, Renuka Goyal 2, Gurmeet Kaur 3 1 M.Tech Scholar, Computer Science and Technology, Central University of Punjab, Punjab, India
Orchestration and detection of stealthy DoS/DDoS Attacks
Orchestration and detection of stealthy DoS/DDoS Attacks Mohammedshahzan A Mulla 1, Asst prof Shivraj V B 2 Mtech - Dept. of CSE CMRIT Bangalore. Abstract The accomplishment of the cloud computing model
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards
White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the
Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage
Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage Priyanga.R 1, Maheswari.B 2, Karthik.S 3 PG Scholar, Department of CSE, SNS College of technology, Coimbatore-35,
Vulnerability Analysis of Hash Tables to Sophisticated DDoS Attacks
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 12 (2014), pp. 1167-1173 International Research Publications House http://www. irphouse.com Vulnerability
90% of data breaches are caused by software vulnerabilities.
90% of data breaches are caused by software vulnerabilities. Get the skills you need to build secure software applications Secure Software Development (SSD) www.ce.ucf.edu/ssd Offered in partnership with
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies Dave Corbett Technical Product Manager Implementing Forward Secrecy 1 Agenda Part 1: Introduction Why is Forward Secrecy important?
1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?
Page 1 of 5 1. Introduction The present document explains about common attack scenarios to computer networks and describes with some examples the following features of the MilsGates: Protection against
Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn
Web Payment Security A discussion of methods providing secure communication on the Internet Group Members: Peter Heighton Zhao Huang Shahid Kahn 1. Introduction Within this report the methods taken to
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
THREAT MODELLING FOR SECURITY TOKENS IN WEB APPLICATIONS
THREAT MODELLING FOR SECURITY TOKENS IN WEB APPLICATIONS Danny De Cock, Karel Wouters, Dries Schellekens, Dave Singelee and Bart Preneel COSIC Research Group, Dept. Electrical Engineering-ESAT, Katholieke
SECURING APACHE : DOS & DDOS ATTACKS - I
SECURING APACHE : DOS & DDOS ATTACKS - I In this part of the series, we focus on DoS/DDoS attacks, which have been among the major threats to Web servers since the beginning of the Web 2.0 era. Denial
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
Lecture 9 - Message Authentication Codes
Lecture 9 - Message Authentication Codes Boaz Barak March 1, 2010 Reading: Boneh-Shoup chapter 6, Sections 9.1 9.3. Data integrity Until now we ve only been interested in protecting secrecy of data. However,
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES
SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES Contents Introduction... 3 DRM Threat Model... 3 DRM Flow... 4 DRM Assets... 5 Threat Model... 5 Protection of
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING Sonam Mahajan 1 and Maninder Singh 2 1 Department of Computer Science Engineering, Thapar University, Patiala, India 2 Department of Computer Science Engineering,
Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper
Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper Securing Web Applications As hackers moved from attacking the network to attacking the deployed applications, a category
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India
A Study on the Security of RFID with Enhancing Privacy Protection
A Study on the Security of RFID with Enhancing Privacy Protection *Henry Ker-Chang Chang, *Li-Chih Yen and *Wen-Chi Huang *Professor and *Graduate Students Graduate Institute of Information Management
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. [email protected]
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 02 Overview on Modern Cryptography
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential
International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 11, November 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise
Installation and usage of SSL certificates: Your guide to getting it right
Installation and usage of SSL certificates: Your guide to getting it right So, you ve bought your SSL Certificate(s). Buying your certificate is only the first of many steps involved in securing your website.
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
Internet Banking System Web Application Penetration Test Report
Internet Banking System Web Application Penetration Test Report Kiev - 2014 1. Executive Summary This report represents the results of the Bank (hereinafter the Client) Internet Banking Web Application
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card C. Koner, Member, IACSIT, C. T. Bhunia, Sr. Member, IEEE and U. Maulik, Sr. Member, IEEE
GPU File System Encryption Kartik Kulkarni and Eugene Linkov
GPU File System Encryption Kartik Kulkarni and Eugene Linkov 5/10/2012 SUMMARY. We implemented a file system that encrypts and decrypts files. The implementation uses the AES algorithm computed through
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
A Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments
A Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments Faraz Fatemi Moghaddam ([email protected]) Omidreza Karimi ([email protected]) Dr. Ma en T. Alrashdan ([email protected])
Application of Netflow logs in Analysis and Detection of DDoS Attacks
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 1-8 International Research Publication House http://www.irphouse.com Application of Netflow logs in
Name: 1. CSE331: Introduction to Networks and Security Fall 2003 Dec. 12, 2003 1 /14 2 /16 3 /16 4 /10 5 /14 6 /5 7 /5 8 /20 9 /35.
Name: 1 CSE331: Introduction to Networks and Security Final Fall 2003 Dec. 12, 2003 1 /14 2 /16 3 /16 4 /10 5 /14 6 /5 7 /5 8 /20 9 /35 Total /135 Do not begin the exam until you are told to do so. You
Capture Resilient ElGamal Signature Protocols
Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics [email protected] 2 Bilkent University, Department
Distributed Denial of Service Attacks & Defenses
Distributed Denial of Service Attacks & Defenses Guest Lecture by: Vamsi Kambhampati Fall 2011 Distributed Denial of Service (DDoS) Exhaust resources of a target, or the resources it depends on Resources:
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
Virtual Private Networks
Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering
White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
Malicious Software. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49. Viruses and Related Threats
Malicious Software Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Outline Viruses and Related Threats Malicious Programs The Nature of Viruses Antivirus
M-Shield mobile security technology
Technology for Innovators TM M-Shield mobile security technology making wireless secure Overview As 3G networks are successfully deployed worldwide, opportunities are arising to deliver to end-users a
SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper
SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4
Chapter 7: Network security
Chapter 7: Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer: secure e-mail transport
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
Overview Most of the documentation out there on the transition from SHA-1 certificates to SHA-2 certificates will tell you three things:
SHA-1 Versus SHA-2 Overview Most of the documentation out there on the transition from SHA-1 certificates to SHA-2 certificates will tell you three things: - Breaking SHA-1 is not yet practical but will
RSA Attacks. By Abdulaziz Alrasheed and Fatima
RSA Attacks By Abdulaziz Alrasheed and Fatima 1 Introduction Invented by Ron Rivest, Adi Shamir, and Len Adleman [1], the RSA cryptosystem was first revealed in the August 1977 issue of Scientific American.
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Associate Prof. Dr. Victor Onomza Waziri
BIG DATA ANALYTICS AND DATA SECURITY IN THE CLOUD VIA FULLY HOMOMORPHIC ENCRYPTION Associate Prof. Dr. Victor Onomza Waziri Department of Cyber Security Science, School of ICT, Federal University of Technology,
How To Secure Cloud Computing
Resilient Cloud Services By Hemayamini Kurra, Glynis Dsouza, Youssif Al Nasshif, Salim Hariri University of Arizona First Franco-American Workshop on Cybersecurity 18 th October, 2013 Presentation Outline
E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications
Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html
