Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Preventing Denial of Service Attack in Multicast Authentication


Affiliations
1 Sree Sastha College of Engineering, Chennai, India
2 St. Peters College of Engineering and Technology, Chennai, India
     

   Subscribe/Renew Journal


Multicasting is a technique in which the data is send from sender to multiple receivers. In this paper we discuss the different techniques used for multicast authentication. Here the method for authentication, the batch signature verification is discussed and shown that how it is better from block based approach and other conventional approaches. The main drawback of batch signature verification, the denial of service attack is taken into consideration and we propose a composite denial of service attack model in multicast batch signature verification schemes that combines bandwidth exhaustion, memory depletion models and filtering for representation of cyber attacks. On the basic of the introduced model, different experiments are done. The results shows the dependencies of influence of attacker and victim's properties on the successful probability of DoS attack and the composite model can minimize the DoS attack level in multicast authentication. In future we can improve the efficiency of this method by combining more filtering mechanisms against DoS attacks.

Keywords

Bandwidth Exhaustion, DoS Attack, Multicast, MABS, SYN FLOOD, TESLA.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 211

PDF Views: 2




  • Preventing Denial of Service Attack in Multicast Authentication

Abstract Views: 211  |  PDF Views: 2

Authors

S. Geerthik
Sree Sastha College of Engineering, Chennai, India
T. P. Anish
St. Peters College of Engineering and Technology, Chennai, India

Abstract


Multicasting is a technique in which the data is send from sender to multiple receivers. In this paper we discuss the different techniques used for multicast authentication. Here the method for authentication, the batch signature verification is discussed and shown that how it is better from block based approach and other conventional approaches. The main drawback of batch signature verification, the denial of service attack is taken into consideration and we propose a composite denial of service attack model in multicast batch signature verification schemes that combines bandwidth exhaustion, memory depletion models and filtering for representation of cyber attacks. On the basic of the introduced model, different experiments are done. The results shows the dependencies of influence of attacker and victim's properties on the successful probability of DoS attack and the composite model can minimize the DoS attack level in multicast authentication. In future we can improve the efficiency of this method by combining more filtering mechanisms against DoS attacks.

Keywords


Bandwidth Exhaustion, DoS Attack, Multicast, MABS, SYN FLOOD, TESLA.