Defend Dos Attack with Geometric Hashing Function and Software Puzzle

Abstract

DOS attack can be exhaust the target server’s resources have become major threat to today’s internet. Even though client problem represent a promising way to defend against certain classes of DOS attack, several questions stand in the way of their use in practice. Existing software puzzle system issues their puzzle algorithm already. The attackers can easily solving the puzzle using puzzle solving software. We proposed a new client puzzle software algorithm that can choose puzzle algorithm randomly during the request form the client. The attacker cannot show progress since server chooses the puzzle algorithm randomly. We implement an efficient password authentication scheme based on a geometric hashing function in order to improve the confirmation. A single message prepared by the client and sent to the server, and a confirmation performs by the server. It efficiently defends beside DOS, verifier-stolen attack, replay attack, password guessing attack, min-in-the-middle attack.

Authors and Affiliations

Kiruthika Rengaraj, Matheshwaran Verappan

Keywords

Related Articles

Web Crawler Used in Search Engine

The World Wide Web (WWW) is a collection of billions of documents formatted using HTML. Web Search engines are used to find the desired information on the World Wide Web. Whenever a user query is inputted, searching is...

Thermo-mechanical Analysis of Functionally Graded Rotating Disc

The study investigates the thermo-mechanical response for a variable thickness rotating disc made of functionally graded materials (FGM). The thickness of FGM disc is varying non-linearly along the radius. The distribut...

Bluesaver: Smart Phones Energy Saving

Wi-Fi ultimately has two extremes: silent power consumption and valuable fixer, or could hear a pin drop latency and an arm and a leg power consumption. Wi-Fi Power Save Mode saves desire by capital and labor added late...

A New Approach for Finding Maximally Frequent Set in Transactional Database

Data mining is a methodology with the ability to extract information from large data sets and transforming it into understandable form for further use. The information obtained is of great value and has proven to be adv...

LTE Downlink Channel Estimation Using Music Algorithm

3GPP LTE is the evolution of the UMTS in response to ever‐increasing demands for high quality multimedia services according to users’ expectations. Since downlink is always an important factor in coverage and capacity a...

Download PDF file
  • EP ID EP20655
  • DOI -
  • Views 227
  • Downloads 3

How To Cite

Kiruthika Rengaraj, Matheshwaran Verappan (2015). Defend Dos Attack with Geometric Hashing Function and Software Puzzle. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(5), -. https://europub.co.uk/articles/-A-20655