DOI QR코드

DOI QR Code

Delay based Authentication Model for Flooding of Service Tolerance of Rehabilitation Psychology Analysis System

재활심리분석시스템의 폭주서비스 감내를 위한 지연기반 인증모델

  • Lim, Ho-Chan (Department of Psychological Rehabilitation, Korea Nazarene University) ;
  • Kim, Young-Soo (Research and Business Foundation, Korea Nazarene University)
  • Received : 2013.08.07
  • Accepted : 2013.08.30
  • Published : 2013.09.30

Abstract

Today's rapidly changing society can lead to maladaptive behaviors. In the situations, rehabilitation psychology analysis using the on-line test be needed to solve the problem. However, Internet-based rehabilitation psychology analysis by a malicious attacker may still be vulnerable to denial-of-service attacks. The service flooding attacks render the server incapable of providing its service to legitimate clients. Therefore the importance of implementing systems that prevent denial of service attacks and provide service to legitimate users cannot be overemphasized. In this paper, we propose a puzzle protocol which applies to authentication model. our gradually strengthening authentication model improves the availability and continuity of services and prevent denial of service attacks and we implement flooding of service tolerance system to verify the efficiency of our model. This system is expected to be ensure in the promotion of reliability.

급변하는 사회 속에서 개인의 심리적, 정신적 건강과 개인이 속한 가정이나 학교, 직장에서 일어나는 부적응 문제를 해결하기 위한 온라인 개인 심리검사의 수요가 증가되고 있다. 하지만 인터넷 기반 심리검사는 악의적인 공격자에 의해 폭주서비스를 통한 서비스 거부공격의 취약성이 존재한다. 따라서 서비스 거부공격을 억제하고 합법적인 사용자에게 최대한의 보안성과 가용성을 제공할 수 있는 시스템의 능력이 요구된다. 이의 해결책으로 지연 프로토콜을 수용한 부하가중 인증모델을 제안하고 검증하였다. 제안 모델은 인증의 점진적인 강화 기법을 사용해서 급속하게 증가하고 있는 서비스거부공격을 억제하고 서비스의 지속성을 보장함으로써 보안서버시스템의 신뢰성을 높여 줄 수 있을 것으로 기대된다.

Keywords

References

  1. Krawcyzk, H., "The Order of Encryption and Authentication for Protecting Communications," In Proc. Crypto '01, 2010.
  2. Kargl, F., J. Maier, and M. Weber, "Protecting Web Servers from Distributed Denial of Service Attacks," in World Wide Web, pp. 252-262, 2011.
  3. Shari, L., "A Framework for Security Requirements," Computer & Security, Vol.10, pp.511-523, 1991
  4. Catherine, M., "A formal framework and evaluation method for network denial of service," In Proc. 12th IEEE Computer Security Foundations Workshop, pp.4-13, 2011.
  5. Jhon, B., J. Ari, "Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks," Proceedings of the Network and Distributed Systems Security Symposium, Feb., 2012.
  6. Boneh, D., M. Franklin, "Identity based encryption from the Weil paring," Advances in Cryptology: Crypto, pp.213-229, 2011.
  7. Pasi, E., "Denial of Service in Public Key Protocols," Helsinki University of Technology 2010.
  8. Tuomas, A., N. Pekka and L. Jussipekka, "DOS-resistant Authentication with Client Puzzles," Proceedings of the International Workshop on Security Protocols, April 2012.
  9. Dean, D. and A. Stubblefield, "Using Client Puzzles to Protect TLS," in 10th Annual USENIX Security Symposium, 2010.
  10. Young-Soo, Kim, Heung-Sik Choi,"Security Model and Application of Persistent Object using Type Information in Integrated Environment of Distributed System," The Korea Institute of Martime Information & Communication & Sciences, vol.4, no.1, pp661-669. June. 2004.