Defending Servers Against Naptha Attack By Using An Early Client Authentication Method

dc.contributor.authorCheng, Han Pin
dc.date.accessioned2016-10-14T01:26:15Z
dc.date.available2016-10-14T01:26:15Z
dc.date.issued2008-06
dc.description.abstractNaptha attack aims to disrupt TCP service a server provides by generating large amount of forged connections to the server. The targeted server includes secure shell server, mail server, web server and file server. These servers typically create one process or one thread for each established incoming request regardless of whether the client is legitimate or not. Once the maximum process limit or thread limit is reached, new request will be closed and dropped. Hence, Naptha attack is also a Denial of Service attack. In this research, we propose Early Client Authentication Method (ECAM) in defending server that required client login against Naptha DoS attack. This method patches the gap between connection establishment and client validation which appears in current TCP implementation. The advantages of the proposed authentication method are simple, efficient and it does not introduce additional transaction between client and server. Results show that the proposed ECAM is capable in handling the attack on our test machine while continue serving its client.en_US
dc.identifier.urihttp://hdl.handle.net/123456789/2742
dc.subjectNaptha attack aims to disrupten_US
dc.subjectTCP service a server providesen_US
dc.titleDefending Servers Against Naptha Attack By Using An Early Client Authentication Methoden_US
dc.typeThesisen_US
Files
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: