Skip to main content

Design of Open Equation Archive Server Resistant against Denial-of-Service Attacks

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 296))

Abstract

We studied resistance against denial-of-service attacks in a webbased equation-archive server. Each set of equations to be archived should be verified not only by its contributor (on the client side) but also by the archive server (on the server side) to preserve the integrity of the archive. Checking an equation set entails a certain amount of computational cost, and if a malicious user submits an equation set whose verification is computationally expensive, excessive cost is placed upon the archive server, resulting in a denial-of-service attack. In this paper, we propose a new technique for improving a server’s resistance against such attacks, known as the estimate-attaching method. This technique will also be applied to other kinds of web applications.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Baader, F., Nipkow, T.: Term Rewriting and All That. Cambridge University Press (1999)

    Google Scholar 

  2. Knuth, D., Bendix, P.: Simple word problems in universal algebras. In: Computational Problems in Abstract Algebra, pp. 264–296 (1970)

    Google Scholar 

  3. Necula, G.: Proof-Carrying Code. In: Proceedings of the 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 106–109 (1997)

    Google Scholar 

  4. Tsukada, Y.: Interactive and provablistic proof of mobile code safety. Automated Software Engineering 12(2), 237–257 (2005)

    Article  Google Scholar 

  5. Meadows, C.: A formal framework and evaluation method for network denial of service. In: Proceedings of the 12th IEEE Computer Security Foundations Workshop, pp. 4–13 (1999)

    Google Scholar 

  6. Tomioka, D., Nishizaki, S., Ikeda, R.: A Cost Estimation Calculus for Analyzing the Resistance to Denial-of-Service Attack. In: Futatsugi, K., Mizoguchi, F., Yonezaki, N. (eds.) ISSS 2003. LNCS, vol. 3233, pp. 25–44. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  7. Aura, T., Nikander, P., Leiwo, J.: DOS-Resistant Authentication with Client Puzzles. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2000. LNCS, vol. 2133, pp. 170–177. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  8. Ikeda, R., Narita, K., Nishizaki, S.: Cooperative model checking and network simulation for cost analysis of distributed systems. International Journal of Computers and Applications 33(4), 323–329 (2011)

    Article  Google Scholar 

  9. Ikeda, R., Nishizaki, S., Ohata, T.: Formalization of broadcast communication in process calculus and its model checking. In: Proceedings of the 4th International Conference on Software and Data Technologies, ICSOFT 2009, vol. 1, pp. 348–352 (2009)

    Google Scholar 

  10. McDowell, M.: Understanding Denial-of-Service Attacks. Cyber Security Tip ST04-015, US-CERT (2004)

    Google Scholar 

  11. Denial of service attacks, CERT (1997), http://www.cert.org/tech_tips/denial_of_service.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Nishizaki, Sy., Tamano, H. (2013). Design of Open Equation Archive Server Resistant against Denial-of-Service Attacks. In: Das, V.V., Chaba, Y. (eds) Mobile Communication and Power Engineering. AIM 2012. Communications in Computer and Information Science, vol 296. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35864-7_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35864-7_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35863-0

  • Online ISBN: 978-3-642-35864-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics