Font Size: a A A

Research On Protecting Authentication Protocols Against Denial Of Service Attack And Implementation Of Security Solution To Improve The Protocols

Posted on:2008-02-20Degree:MasterType:Thesis
Country:ChinaCandidate:J H ChenFull Text:PDF
GTID:2178360215997660Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Now, DoS attack is one of the ordinarily attacks on Internet. Because it severe damaged Internet and be hard to defend, DoS attack has become the main security problem of Internet. Authentication protocol is an important kind of security protocols, and often being used for secure communication between different objects. This paper focuses on the authentication protocol's DoS attack weakness, and also presents the security solutions for protecting authentication protocols against DoS attack.The paper introduces the principle, attack types, the ordinarily attack methods and defense strategy of DoS attack, analyses the authentication protocols and its DoS attack weakness, also point out that authentication protocols need to use complicated cryptogram algorithm to ensure its security, which causes the DoS attack weakness. Based on the position of protecting protocol's responder, combining the Cookie way with work proof means, the paper presents the sponsor identity checking security solution for dual-object authentication protocols defending DoS attack, carries out the structure design and implementation design, and analyses its performance in different way. Based the sponsor identity checking solution, the paper presents the sponsor identity authenticating security solution for the special condition which the subsequent protocol has more compute work and the demand for security is much higher. According to the two security solutions, we build the experiment models for sponsor and responder, implement the models with C++, and analyze the experiment data and figure. The analysis shows that the two security solutions are effective. Finally, we use the sponsor identity checking solution and sponsor identity authenticating solution to improve NSPK protocol and Helsinki protocol, which making both protocols enhance their ability on defending DoS attack.
Keywords/Search Tags:authentication protocol, denial of service (DoS), security protocol, MD5, security solution
PDF Full Text Request
Related items