Preventing Denial of Service Attack in Multicast Authentication
Abstract
Keywords
Full Text:
PDFReferences
Perrig, R. Canetti, J. D. Tygar, and D. Song,“Efficient authentication and signature of multicast streams over lossy channels”. In Proceedings of the IEEE Symposium on Research in Security and Privacy, Sept 2000, pp 56–73.
Chang, Rocky K. C , “Defending against flooding-based distributed denial-of-service attacks”: a tutorial, IEEE Communications Magazine 40(10),Oct 2002, pp 42–51.
C. Karlof, N. Sastry, Y. Li, A. Perrig, and J.D. Tygar, “Distillation Codes and Applications to DoS Resistant Multicast Authentication,” In Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS‟04), San Diego, California, Feb 2004, pp 37-56.
Huang,Q.; Kobayashi, H.; Liu, B. “Analysis of a new form of distributed denial of service attack”, in the Conference of Information Science and Systems. The Johns Hopkins University, March 2003, pp 1-6.
J.Camenisch and A. Lysyanskaya.“Dynamic accumulators and application to efficient revocation of anonymous credentials”. In Advances in Cryptology – CRYPTO ‟02, volume 2442 of Lecture Notes in Computer Science, Feb 2002, pp 61-76.
J. M. Park, E. Chong, and H. J. Siegel. “Efficient multicast packet authentication using erasure codes” ACM Transactions on Information and System Security(TISSEC), May 2003, pp 258-285.
M. Luby, M. Mitzenmacher, A. Shokrollahi, D. Spielman, and V. Stemann. “Practical loss-resilient codes”. In Proceedings of 29th Annual ACM Symposium on Theory of Computing (STOC ‟97), May 1997, pp 150-159.
Shouhuai Xu, Ravi Sandhu,”Authenticated Multicast Immune to Denial-of-Service”, Proceedings of ACM symposium on Applied computing, March 2002, pp 196-200.
Stephen. M. Specht, Ruby. B. Lee.”Distributed denial of service: Taxonomies of attacks, tools and countermeasures, in International Conference Parallel and Distributed Computing Dydtems. San Francisco, Sep 2004, pp 15–17.
T. Hardjono and G. Tsudik. "IP multicast security: Issues and directions", presented at Annales des Telecommunications, April 2000, pp 324-340.
Yun, Zhou. “MABS: Multicast Authentication based on Batch Signature”, IEEE Transactions on Mobile Computing, Vol. 9, No. 7, July 2010, pp 982-993.
Yun, Zhou, “Multimedia Broadcast Authentication Based on Batch Signature” IEEE Communications Magazine,, Vol. 45, No. 8, August 2007, pp 72-77.
Nakashima, Takuo. “Performance Estimation of TCP under SYN flood attacks”International conference on Complex Intelligent and Software Intensive Systems, April 2007, pp 92-99.
Zhu, Ning, Zhang, Yongfu, ”A new method to construct DoS attack oriented to Attack Resistance Test”, Information Theory and Information Security (ICITIS), 2010 IEEE International Conference on Dec 2010, pp 654-659.
Specht, S.M, Lee, R. B, “Distributed denial of service: taxonomies of attacks, tools and countermeasures”, in International Conference of Parallel and Distributed Computing Dydtems, San Francisco, 2004, 15–17.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.