Client Puzzle Approach for Improving Confidentiality
Ms. Sapna, S. Khapre, Prof. Shrikant Ardhapurkar "Client Puzzle Approach for Improving Confidentiality "International Journal of Computer Trends and Technology (IJCTT),V4(5):1481-1484 May Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract: - In present scenario, security of data or information is main concerned. Different defense strategies are developed to avoid DoS-Denial of Service attack, but they don’t provide optimal solution against DoS attack. Preventive mechanisms against flooding attacks can be effectively studied through game theory. This is mainly owing to the several trade-offs existing in a flooding attack defense scenario. For an attacker, there is a trade-off between the severity of his attack and the amount of resources he uses to do so; the more damage an attacker intends to cause, the more amounts of resources he should spend. For a defender, on the other hand, there is a trade-off between the effectiveness of his defense and the quality of service he provides for legitimate users; the more difficult it becomes to exhaust the defender’s resources, the more workload, and hence, less quality of service is imposed on legitimate users. To improve the quality of service for legitimate user and also to improve confidentiality, puzzle based defense technique is used. With the help of puzzle based system we can avoid DoS attack. .
References-
[1] Raju Neyyan, Ancy Paul, Mayank Deshwal and Amit Deshmukh, “Game Theory based Defense Mechanism against Flooding Attack using Puzzle,” Emerging Trends in Computer Science and Information Technology, pg 5-10, no. 1, April 2012.
[2] Kumar Dayanand and S. Magesh, ”Defence Strategy against Flooding Attacks Using Nash Equilibrium Game Theory,” International Conference on Computing and Control Engineering (ICCCE 2012), April 2012.
[3] Tanmay Sanjay Khirwadkar, “Defense Against Network Attacks Using Game Theory,” University Of Illinois At Urbana-Champaign, May 2011.
[4] Mehran S. Fallah, ”A Puzzle-Based Defence Strategy Against Flooding Attacks Using Game Theory,” IEEE transactions on dependable and secure computing, vol. 7, no. 1, pg 5-19, 2010.
[5] D. Moore, C. Shannon, D.J. Brown, G.M. Voelker, and S. Savage,“Inferring Internet Denial-of-Service Activity,” ACM Trans.Computer Systems, vol. 24, no. 2, pp. 115-139, May 2006.
[6] Jelena Mirkovic, Janice Martin and Peter Reiher, “A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms,” ACM SIGCOMM Computer Communication, Vol. 34, no. 2, pp. 39 – 53, April 2004.
[7] E. Bursztein and J. Goubalt-Larrecq, “A logical framework for evaluating network resilience against faults and attacks,” Lecture Notes in Computer Science, Vol. 4846, 2007.
[8] T. Aura, P. Nikander, and J. Leiwo. “DoS-Resistant Authentication with Client Puzzles,” Lecture Notes in Computer Science, vol. 2133, 2001.
Keywords — Hierarchical clustering, document clustering, similarity measure