Cloud-Based Secure Authentication (CSA) Protocol Suite for Defense against DoS Attacks

11/22/2017
by   Marwan Darwish, et al.
0

Cloud-based services have become part of our day-to-day software solutions. The identity authentication process is considered to be the main gateway to these services. As such, these gates have become increasingly susceptible to aggressive attackers, who may use Denial of Service (DoS) attacks to close these gates permanently. There are a number of authentication protocols that are strong enough to verify identities and protect traditional networked applications. However, these authentication protocols may themselves introduce DoS risks when used in cloud-based applications. This risk introduction is due to the utilization of a heavy verification process that may consume the cloud resources and disable the application service. In this work, we propose a novel cloud-based authentication protocol suite that not only is aware of the internal DoS threats but is also capable of defending against external DoS attackers. The proposed solution uses a multilevel adaptive technique to dictate the efforts of the protocol participants. This technique is capable of identifying a legitimate users requests and placing them at the front of the authentication process queue. The authentication process was designed in such a way that the cloud-based servers become footprint-free and completely aware of the risks of any DoS attack.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/22/2017

Formal Analysis of an Authentication Protocol Against External Cloud-Based Denial-of-Service (DoS) Attack

The Denial-of-service (DoS) attack is considered one of the largest thre...
research
05/14/2018

AuthStore: Password-based Authentication and Encrypted Data Storage in Untrusted Environments

Passwords are widely used for client to server authentication as well as...
research
07/20/2018

Machine Learning Attack and Defense on Voltage Over-scaling-based Lightweight Authentication

It is a challenging task to deploy lightweight security protocols in res...
research
11/19/2019

Protecting RESTful IoT Devices from Battery Exhaustion DoS Attacks

Many IoT use cases involve constrained battery-powered devices offering ...
research
02/10/2018

About being the Tortoise or the Hare? - A Position Paper on Making Cloud Applications too Fast and Furious for Attackers

Cloud applications expose - beside service endpoints - also potential or...
research
05/20/2022

Vulnerability Analysis and Performance Enhancement of Authentication Protocol in Dynamic Wireless Power Transfer Systems

Recent advancements in wireless charging technology, as well as the poss...
research
09/09/2020

Impersonation-as-a-Service: Characterizing the Emerging Criminal Infrastructure for User Impersonation at Scale

In this paper we provide evidence of an emerging criminal infrastructure...

Please sign up or login with your details

Forgot password? Click here to reset