Abstract
We studied resistance against denial-of-service attacks in a webbased equation-archive server. Each set of equations to be archived should be verified not only by its contributor (on the client side) but also by the archive server (on the server side) to preserve the integrity of the archive. Checking an equation set entails a certain amount of computational cost, and if a malicious user submits an equation set whose verification is computationally expensive, excessive cost is placed upon the archive server, resulting in a denial-of-service attack. In this paper, we propose a new technique for improving a server’s resistance against such attacks, known as the estimate-attaching method. This technique will also be applied to other kinds of web applications.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Baader, F., Nipkow, T.: Term Rewriting and All That. Cambridge University Press (1999)
Knuth, D., Bendix, P.: Simple word problems in universal algebras. In: Computational Problems in Abstract Algebra, pp. 264–296 (1970)
Necula, G.: Proof-Carrying Code. In: Proceedings of the 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 106–109 (1997)
Tsukada, Y.: Interactive and provablistic proof of mobile code safety. Automated Software Engineering 12(2), 237–257 (2005)
Meadows, C.: A formal framework and evaluation method for network denial of service. In: Proceedings of the 12th IEEE Computer Security Foundations Workshop, pp. 4–13 (1999)
Tomioka, D., Nishizaki, S., Ikeda, R.: A Cost Estimation Calculus for Analyzing the Resistance to Denial-of-Service Attack. In: Futatsugi, K., Mizoguchi, F., Yonezaki, N. (eds.) ISSS 2003. LNCS, vol. 3233, pp. 25–44. Springer, Heidelberg (2004)
Aura, T., Nikander, P., Leiwo, J.: DOS-Resistant Authentication with Client Puzzles. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2000. LNCS, vol. 2133, pp. 170–177. Springer, Heidelberg (2001)
Ikeda, R., Narita, K., Nishizaki, S.: Cooperative model checking and network simulation for cost analysis of distributed systems. International Journal of Computers and Applications 33(4), 323–329 (2011)
Ikeda, R., Nishizaki, S., Ohata, T.: Formalization of broadcast communication in process calculus and its model checking. In: Proceedings of the 4th International Conference on Software and Data Technologies, ICSOFT 2009, vol. 1, pp. 348–352 (2009)
McDowell, M.: Understanding Denial-of-Service Attacks. Cyber Security Tip ST04-015, US-CERT (2004)
Denial of service attacks, CERT (1997), http://www.cert.org/tech_tips/denial_of_service.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Nishizaki, Sy., Tamano, H. (2013). Design of Open Equation Archive Server Resistant against Denial-of-Service Attacks. In: Das, V.V., Chaba, Y. (eds) Mobile Communication and Power Engineering. AIM 2012. Communications in Computer and Information Science, vol 296. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35864-7_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-35864-7_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35863-0
Online ISBN: 978-3-642-35864-7
eBook Packages: Computer ScienceComputer Science (R0)