Method of rejecting service attuck by resisting radio transmission layer safety protocol

A denial of service attack, security protocol technology, applied in the field of intelligent information processing, can solve the problems of consuming memory resources, exhausting server computing resources, consuming computing resources, etc., to achieve the effect of improving security

Inactive Publication Date: 2004-12-22
SHANGHAI JIAO TONG UNIV
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The second type of attack method is also an attack that consumes memory resources, which is called exiting a secure connection attack
[0005] The third type of attack method is an attack that consumes computing resources, called an exponential operation attack
When the client n

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of rejecting service attuck by resisting radio transmission layer safety protocol
  • Method of rejecting service attuck by resisting radio transmission layer safety protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0024] When the client sends a client greeting message and requests to establish a secure connection with the server, the server first checks whether the number of secure connections established by the IP address of the client has exceeded the specified quota according to the access control mechanism. If it has exceeded the quota, Then reject the client's secure connection request, otherwise, send a server greeting message, and check the number of exponent operations and the number of wrong exponent operations per unit time of the IP address of the client. According to these two values, it is decided to use figure 1 handshake is still figure 2 The handshake method, if using figure 2 The size of the corresponding client riddle space k can be determined according to the above two values. if used figure 1 When sending the server hello message, the server will also send the server certificate*, server key exchange*, certificate request*, server hello end message (messages with...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for resisting the attack of the security protocol refusing service in the wireless transmission layer, which belongs to intelligent information processing technology field. The invention is based on wireless transmission layer security protocol, combined with timer, access control, and server random number response and client terminal riddle mechanism, which resist three kinds of service-refusing attacks effectively, at first, it adds a handshake timer, data timer, for the wireless transmission layer security protocol, it resists the handshake quitting attack through the handshake timer, then uses access control mechanism, it resists the quitting security connection attacks through combining the data timer and the access control mechanism, finally, the server random response mechanism and the client terminal riddle mechanism are used to resist the exponential attack. The invention resists the three kinds of attacks, simple, easy, the security is upgraded greatly.

Description

technical field [0001] The invention relates to a method for improving the existing wireless transmission layer security protocol, in particular to a method for defending against denial of service attacks of the wireless transmission layer security protocol. It belongs to the technical field of intelligent information processing. Background technique [0002] In June 1999, the Wireless Application Protocol Forum officially approved the Wireless Application Protocol (WAP) version 1.1, which includes the Wireless Transport Layer Security Protocol (WTLS) specification (WAP Forum.Wireless TransportLayer Security Version 06-Apr-2001.WAP-261- WTLS-20010406-a, Apr. 2001). The wireless transport layer security protocol ensures the confidentiality and integrity of the data of both parties in communication, and provides authentication and verification mechanisms for both parties in communication. Since WTP runs on top of the unreliable wireless datagram protocol, the server side of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00H04L29/06
Inventor 张瑞山陈克非
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products