A guided tour puzzle for denial of service prevention

M Abliz, T Znati - 2009 Annual Computer Security Applications …, 2009 - ieeexplore.ieee.org
Various cryptographic puzzle schemes are proposed as a defense mechanism against
denial of service attack. But, all these puzzle schemes face a dilemma when there is a large …

Security notions and generic constructions for client puzzles

L Chen, P Morrissey, NP Smart, B Warinschi - Advances in Cryptology …, 2009 - Springer
By a computational puzzle we mean a mildly difficult computational problem that requires
resources (processor cycles, memory, or both) to solve. Puzzles have found a variety of uses …

[PDF][PDF] On chained cryptographic puzzles

B Groza, D Petrica - 3rd Romanian-Hungarian Joint Symposium on …, 2006 - uni-obuda.hu
Cryptographic puzzles provide an elegant solution in combating denial of services attacks.
In this paper we introduce the concept of chained cryptographic puzzle. We define two kinds …

Defeating ddos using productive puzzles

M Abliz, TF Znati - … on Information Systems Security and Privacy …, 2015 - ieeexplore.ieee.org
In this paper, we present Productive Puzzles, a novel puzzle mechanism for defending
against Distributed Denial of Service (DDoS) attacks. Productive puzzles aim to use tasks …

Non-parallelizable and non-interactive client puzzles from modular square roots

YI Jerschow, M Mauve - 2011 Sixth International Conference …, 2011 - ieeexplore.ieee.org
Denial of Service (DoS) attacks aiming to exhaust the resources of a server by
overwhelming it with bogus requests have become a serious threat. Especially protocols that …

New client puzzle outsourcing techniques for DoS resistance

B Waters, A Juels, JA Halderman… - Proceedings of the 11th …, 2004 - dl.acm.org
We explore new techniques for the use of cryptographic puzzles as a countermeasure to
Denial-of-Service (DoS) attacks. We propose simple new techniques that permit the out …

Software puzzle: A countermeasure to resource-inflated denial-of-service attacks

Y Wu, Z Zhao, F Bao, RH Deng - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Denial-of-service (DoS) and distributed DoS (DDoS) are among the major threats to cyber-
security, and client puzzle, which demands a client to perform computationally expensive …

Modular square root puzzles: Design of non-parallelizable and non-interactive client puzzles

YI Jerschow, M Mauve - computers & security, 2013 - Elsevier
Denial of Service (DoS) attacks aiming to exhaust the resources of a server by
overwhelming it with bogus requests have become a serious threat. Especially protocols that …

Defending against denial-of-service attacks with puzzle auctions

XF Wang, MK Reiter - 2003 Symposium on Security and …, 2003 - ieeexplore.ieee.org
Although client puzzles represent a promising approach to defend against certain classes of
denial-of-service attacks, several questions stand in the way of their deployment in practice …

Efficient memory bound puzzles using pattern databases

S Doshi, F Monrose, AD Rubin - … , ACNS 2006, Singapore, June 6-9, 2006 …, 2006 - Springer
CPU bound client puzzles have been suggested as a defense mechanism against
connection depletion attacks. However, the wide disparity in CPU speeds prevents such …