THROTTLING DDoS ATTACKS USING DISCRETE LOGARITHM PROBLEM

Avinash Darapureddi, Radhesh Mohandas, Alwyn R. Pais

2010

Abstract

Amongst all the security issues that the internet world is facing, Distributed Denial of Service attack (DDoS) receives special mention. In a typical DDoS attack, an attacker runs a malicious code on compromised systems to generate enormous number of requests to a single web server. The flood of incoming requests makes the victim web server resources to wear out completely within a short period of time; thereby causing denial of service to the legitimate users. In this paper we propose a solution to trim down the impact of DDoS attacks by throttling the client’s CPU i.e., to make clients pay a stamp fee which is collected in terms of resource usage such as CPU cycles. Our proposed solution makes use of the discrete logarithm problem to generate the CPU stamps.

References

  1. Back, A. (2002). Hashcash - a denial of service countermeasure.
  2. Darrel. Hankerson, A. M. and Vanstone, S. (2004). Guide to Elliptic Curve Cryptography. Springer, NewYork.
  3. Dwork, C. and Naor, M. (1992). Pricing via processing or combatting junk mail. In In Advances in Cryptology - Proc. CRYPTO 98. Springer-Verlag: volume 740 of LNCS, pages 139147, Santa Barbara, CA USA.
  4. Saraiah and et al (2009). Throttling ddos attacks. In Proceedings of SECRYPT 2009 International Conference on Security and Cryptography.
  5. Tuomas Aura, P. N. and Leiwo, J. (2000). Dos-resistant authentication with client puzzles. In Revised Papers from the 8th International Workshop on Security Protocols. Vol. 2133, Pages: 170 - 177.
  6. Wang, X. and Reiter, M. K. (2003). Defending against denial-of-service attacks with puzzle auctions. In Proceedings of the 2003 IEEE Symposium on Security and Privacy. Page: 78.
Download


Paper Citation


in Harvard Style

Darapureddi A., Mohandas R. and R. Pais A. (2010). THROTTLING DDoS ATTACKS USING DISCRETE LOGARITHM PROBLEM . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010) ISBN 978-989-8425-18-8, pages 263-269. DOI: 10.5220/0002981502630269


in Bibtex Style

@conference{secrypt10,
author={Avinash Darapureddi and Radhesh Mohandas and Alwyn R. Pais},
title={THROTTLING DDoS ATTACKS USING DISCRETE LOGARITHM PROBLEM},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)},
year={2010},
pages={263-269},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002981502630269},
isbn={978-989-8425-18-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)
TI - THROTTLING DDoS ATTACKS USING DISCRETE LOGARITHM PROBLEM
SN - 978-989-8425-18-8
AU - Darapureddi A.
AU - Mohandas R.
AU - R. Pais A.
PY - 2010
SP - 263
EP - 269
DO - 10.5220/0002981502630269