Strategy based proxy to secure user agent from flooding attack in SIP

Author(s):  
Intesab Hussain ◽  
Farid Nait-Abdesselam
Keyword(s):  
1998 ◽  
Vol 37 (03) ◽  
pp. 247-253 ◽  
Author(s):  
K. Ohe ◽  
S. Kaihara ◽  
T. Kiuchi

AbstractWWW-based user interface is presented for secure electronic mail service for healthcare users. Using this method, communications between an electronic mail (WWW) server and users (WWW browsers) can be performed securely using Secure Socket Layer protocol-based Hypertext Transfer Protocol (SSL-HTIP). The mail can be encrypted, signed, and sent to the recipients and vice versa on the remote WWW server. The merit of this method is that many healthcare users can use a secure electronic mail system easily and immediately, because SSL-compatible WWW browsers are widely used and this system can be made available simply by installing a WWW-based mail user agent on a mail server. We implemented a WWWbased mail user agent which is compatible with PEM-based secure mail and made it available to about 16,000 healthcare users. We believe this approach is effective in facilitating secure network-based information exchange among medical professionals.


Author(s):  
Ting-Yu Lin ◽  
Jhen-Ping Wu ◽  
Pei-Hsuan Hung ◽  
Ching-Hsuan Shao ◽  
Yu-Ting Wang ◽  
...  

2018 ◽  
Vol 12 (1) ◽  
pp. 15-22 ◽  
Author(s):  
T. Bhatia ◽  
A.K. Verma ◽  
G. Sharma ◽  
S. Bala

Author(s):  
Guang Cheng ◽  
Lixia Zhao ◽  
Xiaoyan Hu ◽  
Shaoqi Zheng ◽  
Hua Wu ◽  
...  
Keyword(s):  

Author(s):  
Linjun Yu ◽  
Huali Ai ◽  
Dong-Oun Choi

Named data networking (NDN) is a typical representation and implementation of information-centric networking and serves as a basis for the next-generation Internet. However, any network architectures will face information security threats. An attack named interest flooding attack (IFA), which is evolved, has becomes a great threat for NDN in recent years. Attackers through insert numerous forged interest packets into an NDN network, making the cache memory of NDN router(s) overrun, interest packets for the intended users. To take a comprehensive understanding of recent IFA detection and mitigation approaches, in this paper, we compared nine typical approaches to resolving IFA attacks for NDN, which are interest traceback, token bucket with per interface fairness, satisfaction-based interest acceptance, satisfaction-based push back, disabling PIT exhaustion, interest flow control method based on user reputation and content name prefixes, interest flow balancing method focused on the number of requests on named data networking, cryptographic route token, Poseidon local, and Poseidon distributed techniques. In addition, we conducted a simulation using Poseidon, a commonly used IFA resolution approach. The results showed that Poseidon could resolve IFA issues effectively.


Sign in / Sign up

Export Citation Format

Share Document