Skip to main content

An Efficient Authentication Method for Throttling DDoS Attacks

  • Conference paper
Global Trends in Computing and Communication Systems (ObCom 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 269))

Included in the following conference series:

Abstract

Distributed Denial of Service Attacks has recently emerged as one of the most newsworthy, if not the greatest, weaknesses of the Internet. DDoS attacks aim to deny legitimate users of the services. In this paper, we introduce a novel secure scheme for defending against the DDoS attack. When the number of requests arriving at the victim crosses the threshold value (T), integer factorization solution is invoked and the victim server starts sending encrypted e(n) which is generated by RSA instead of ‘n’ to all the users. If the user is not an attacker, decrypts the ‘n’ by using CRT and generate ‘p’ and ‘q’ through integer factorization. If the user fails to provide the computational power to decrypt ‘n’ value as well as to find the factors ‘p’ and ‘q’ then consider him as a malicious user.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. MadhuBabu, J., et. al: Throttling DDoS attack. In: Secrypt 2009, Italy (2009)

    Google Scholar 

  2. Edpegg, J.R.: Chinese Remainder theorem. Wolfram Demonstrations project (2007)

    Google Scholar 

  3. Rupa, C., Sridevi, P.: Solution to the Dictionary Attacks using Time-Space Tradeoff with Asymmetric key Cryptography. In: Proceedings in ERTSP organized by Vignan Institute of Information Technology, pp. 120– 124 (2010)

    Google Scholar 

  4. Hwang, R.-J., Su, F.-F.: An efficient decryption method for RSA ceryptosystem. In: Proceedings of the 19th International Conference on Advanced Information Networking and Applications (2005)

    Google Scholar 

  5. Yen, S.-M., et al.: RSA Speed up with Chinese remainder theorem Immune against Hardware fault crypt analysis. IEEE Transactions on Computers 52(4) (2003)

    Google Scholar 

  6. Patra, J.C., et al.: DCT Domain water marking scheme using chaise reminder theorem for image authentication. In: Proceedings in ICME. IEEE (2010)

    Google Scholar 

  7. Edpegg, J.R.: Chinese Remainder theorem. Wolfram Demonstrations project (2007)

    Google Scholar 

  8. Ogiwara, M.: A method for generating cryptographically strong primes. IEICE Trans., 985–994 (1990)

    Google Scholar 

  9. Pinkas, B., Sander, T.: Securing passwords against dictionary attacks. In: Proc. 9th ACM Conference on Computer and Communications Security (CCS), pp. 161–170. ACM (2002)

    Google Scholar 

  10. Mori, G., Malik, J.: Recognizing objects in adversarial clutter: Breaking a visual CAPTCHA. In: Proceedings of Conference on Computer Vision and Pattern Recognition (CVPR 2003), vol. 1, pp. 134–141. IEEE Computer Society (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rupa, C., Madhu Babu, J., Siva Prasad, P., Avadhani, P.S. (2012). An Efficient Authentication Method for Throttling DDoS Attacks. In: Krishna, P.V., Babu, M.R., Ariwa, E. (eds) Global Trends in Computing and Communication Systems. ObCom 2011. Communications in Computer and Information Science, vol 269. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29219-4_54

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29219-4_54

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29218-7

  • Online ISBN: 978-3-642-29219-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics