QUT ePrints

Modelling Denial of Service Attacks on JFK with Meadow's Cost-Based Framework

Boyd, Colin, Gonzalez-Nieto, Juan, & Smith, Jason (2006) Modelling Denial of Service Attacks on JFK with Meadow's Cost-Based Framework. In Buyya, R, Ma, T, Safavi-Naini, R, Steketee, C, & Susilo, W (Eds.) Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Australian Computer Society Inc., Australia, Tasmania, Hobart, pp. 125-134.

[img] Published Version (PDF 213kB)
Administrators only | Request a copy from author

    View at publisher (open access)

    Abstract

    We present the first detailed application of Meadows’s cost-based modelling framework to the analysis of JFK, an Internet key agreement protocol. The analysis identifies two denial of service attacks against the protocol that are possible when an attacker is willing to reveal the source IP address. The first attack was identified through direct application of a cost-based modelling framework, while the second was only identified after considering coordinated attackers. Finally, we demonstrate how the inclusion of client puzzles in the protocol can improve denial of service resistance against both identified attacks.

    Impact and interest:

    4 citations in Scopus
    Search Google Scholar™

    Citation countsare sourced monthly from Scopus and Web of Science® citation databases.

    These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.

    Citations counts from the Google Scholar™ indexing service can be viewed at the linked Google Scholar™ search.

    ID Code: 24877
    Item Type: Conference Paper
    Keywords: Denial of Service, Cryptographic Protocols, Security Analysis Methodologies
    ISBN: 1-920-68236-8
    Subjects: Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > COMPUTATION THEORY AND MATHEMATICS (080200) > Computation Theory and Mathematics not elsewhere classified (080299)
    Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > DATA FORMAT (080400) > Data Format not elsewhere classified (080499)
    Divisions: Past > QUT Faculties & Divisions > Faculty of Science and Technology
    Past > Institutes > Information Security Institute
    Deposited On: 18 Jun 2009 00:47
    Last Modified: 09 Mar 2012 02:36

    Export: EndNote | Dublin Core | BibTeX

    Repository Staff Only: item control page