Skip to main content
placeholder image

Efficient trapdoor-based client puzzle against DoS attacks

Chapter


Abstract


  • It is well known that authentication, integrity, and confidentiality are the most important principles of network security. However, recent reports about a number of prominent Internet service providers that broke down because of malicious attacks [2, 3, 32,32] urge people to realize that all security principles must be based on service availability. Availability in this context refers to a service that can be accessed within a reasonable amount of waiting time after a legitimate client sends a request. © 2010 Springer Science+Business Media, LLC.

Publication Date


  • 2010

Citation


  • Gao, Y., Susilo, W., Mu, Y., & Seberry, J. (2010). Efficient trapdoor-based client puzzle against DoS attacks. In Network Security (pp. 229-249). doi:10.1007/978-0-387-73821-5_10

International Standard Book Number (isbn) 13


  • 9780387738208

Scopus Eid


  • 2-s2.0-84867019755

Web Of Science Accession Number


Book Title


  • Network Security

Start Page


  • 229

End Page


  • 249

Abstract


  • It is well known that authentication, integrity, and confidentiality are the most important principles of network security. However, recent reports about a number of prominent Internet service providers that broke down because of malicious attacks [2, 3, 32,32] urge people to realize that all security principles must be based on service availability. Availability in this context refers to a service that can be accessed within a reasonable amount of waiting time after a legitimate client sends a request. © 2010 Springer Science+Business Media, LLC.

Publication Date


  • 2010

Citation


  • Gao, Y., Susilo, W., Mu, Y., & Seberry, J. (2010). Efficient trapdoor-based client puzzle against DoS attacks. In Network Security (pp. 229-249). doi:10.1007/978-0-387-73821-5_10

International Standard Book Number (isbn) 13


  • 9780387738208

Scopus Eid


  • 2-s2.0-84867019755

Web Of Science Accession Number


Book Title


  • Network Security

Start Page


  • 229

End Page


  • 249