Defend Dos Attack with Geometric Hashing Function and Software Puzzle
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 5
Abstract
DOS attack can be exhaust the target server’s resources have become major threat to today’s internet. Even though client problem represent a promising way to defend against certain classes of DOS attack, several questions stand in the way of their use in practice. Existing software puzzle system issues their puzzle algorithm already. The attackers can easily solving the puzzle using puzzle solving software. We proposed a new client puzzle software algorithm that can choose puzzle algorithm randomly during the request form the client. The attacker cannot show progress since server chooses the puzzle algorithm randomly. We implement an efficient password authentication scheme based on a geometric hashing function in order to improve the confirmation. A single message prepared by the client and sent to the server, and a confirmation performs by the server. It efficiently defends beside DOS, verifier-stolen attack, replay attack, password guessing attack, min-in-the-middle attack.
Authors and Affiliations
Kiruthika Rengaraj, Matheshwaran Verappan
Swift Heavy Ion Induced Impedance of PVDC (Poly Vinylidene Chloride)
Impedance of ion induced PVDC (Poly vinylidene chloride) was analyzed. Lithium (50 MeV), carbon (85 MeV) and nickel (120 MeV) ion beams were used to analyze the modifications induced by swift heavy ions as a function of...
Dynamic analysis of laminated composite plates and shells by using a new higher-order shear deformation theory and ABAQUS software.
A new higher order shear deformation theory for elastic composite/sandwich plates and shells is developed. The new displacement field depends on a parameter ‘‘m’’, whose value is determined so as to give results. Static...
Quasi Self Complementary (QSC) Ultra-Wide Band (UWB) Antenna Integrated with Bluetooth
This paper introduces UWB antenna integrated with Bluetooth. This can cover the band of Bluetooth application (2.4GHz) and the band of UWB application (3-12GHz). The proposed antenna consists of semi ring connected with...
Positive and Negative Approach for Association Rule in Data Mining Techniques
when we talk about the fuzzy association rule then its takes lots of calculation or it required software tools to calculate the complex result. The replacement of fuzzy association rule is the Novel approach by Positive...
Performance Analysis and Coding of Blind Adaptive Fractional – Space Constant Modulus Algorithm
in bandwidth-efficient digital transmission, adaptive algorithm is widely used in the digital signal processing like channel estimation, channel equalization, echo cancellation, high definition television (hdtv) set-top...