Browse > Article
http://dx.doi.org/10.6109/jkiice.2013.17.9.2073

Delay based Authentication Model for Flooding of Service Tolerance of Rehabilitation Psychology Analysis System  

Lim, Ho-Chan (Department of Psychological Rehabilitation, Korea Nazarene University)
Kim, Young-Soo (Research and Business Foundation, Korea Nazarene University)
Abstract
Today's rapidly changing society can lead to maladaptive behaviors. In the situations, rehabilitation psychology analysis using the on-line test be needed to solve the problem. However, Internet-based rehabilitation psychology analysis by a malicious attacker may still be vulnerable to denial-of-service attacks. The service flooding attacks render the server incapable of providing its service to legitimate clients. Therefore the importance of implementing systems that prevent denial of service attacks and provide service to legitimate users cannot be overemphasized. In this paper, we propose a puzzle protocol which applies to authentication model. our gradually strengthening authentication model improves the availability and continuity of services and prevent denial of service attacks and we implement flooding of service tolerance system to verify the efficiency of our model. This system is expected to be ensure in the promotion of reliability.
Keywords
Rehabilitation psychology; Psychology analysis; Denial of service attacks; Delay protocol;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Kargl, F., J. Maier, and M. Weber, "Protecting Web Servers from Distributed Denial of Service Attacks," in World Wide Web, pp. 252-262, 2011.
2 Shari, L., "A Framework for Security Requirements," Computer & Security, Vol.10, pp.511-523, 1991
3 Catherine, M., "A formal framework and evaluation method for network denial of service," In Proc. 12th IEEE Computer Security Foundations Workshop, pp.4-13, 2011.
4 Jhon, B., J. Ari, "Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks," Proceedings of the Network and Distributed Systems Security Symposium, Feb., 2012.
5 Boneh, D., M. Franklin, "Identity based encryption from the Weil paring," Advances in Cryptology: Crypto, pp.213-229, 2011.
6 Pasi, E., "Denial of Service in Public Key Protocols," Helsinki University of Technology 2010.
7 Tuomas, A., N. Pekka and L. Jussipekka, "DOS-resistant Authentication with Client Puzzles," Proceedings of the International Workshop on Security Protocols, April 2012.
8 Dean, D. and A. Stubblefield, "Using Client Puzzles to Protect TLS," in 10th Annual USENIX Security Symposium, 2010.
9 Young-Soo, Kim, Heung-Sik Choi,"Security Model and Application of Persistent Object using Type Information in Integrated Environment of Distributed System," The Korea Institute of Martime Information & Communication & Sciences, vol.4, no.1, pp661-669. June. 2004.
10 Krawcyzk, H., "The Order of Encryption and Authentication for Protecting Communications," In Proc. Crypto '01, 2010.