Modelling Denial of Service Attacks on JFK with Meadow's Cost-Based Framework
Boyd, Colin, Gonzalez-Nieto, Juan, & Smith, Jason (2006) Modelling Denial of Service Attacks on JFK with Meadow's Cost-Based Framework. In Buyya, R, Ma, T, Safavi-Naini, R, Steketee, C, & Susilo, W (Eds.) Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Australian Computer Society Inc., Australia, Tasmania, Hobart, pp. 125-134.
|Published Version (PDF 213kB) |
Administrators only | Request a copy from author
We present the first detailed application of Meadows’s cost-based modelling framework to the analysis of JFK, an Internet key agreement protocol. The analysis identifies two denial of service attacks against the protocol that are possible when an attacker is willing to reveal the source IP address. The first attack was identified through direct application of a cost-based modelling framework, while the second was only identified after considering coordinated attackers. Finally, we demonstrate how the inclusion of client puzzles in the protocol can improve denial of service resistance against both identified attacks.
Impact and interest:
Citation countsare sourced monthly fromand citation databases.
These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.
Citations counts from theindexing service can be viewed at the linked Google Scholar™ search.
|Item Type:||Conference Paper|
|Keywords:||Denial of Service, Cryptographic Protocols, Security Analysis Methodologies|
|Subjects:||Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > COMPUTATION THEORY AND MATHEMATICS (080200) > Computation Theory and Mathematics not elsewhere classified (080299)|
Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > DATA FORMAT (080400) > Data Format not elsewhere classified (080499)
|Divisions:||Past > QUT Faculties & Divisions > Faculty of Science and Technology|
Past > Institutes > Information Security Institute
|Deposited On:||18 Jun 2009 00:47|
|Last Modified:||09 Mar 2012 02:36|
Repository Staff Only: item control page