Völker et al., 2007 - Google Patents
Secure TLS: preventing DoS attacks with lower layer authenticationVölker et al., 2007
View PDF- Document ID
- 5469778491591508532
- Author
- Völker L
- Schöller M
- Publication year
- Publication venue
- Kommunikation in Verteilten Systemen (KiVS) 15. Fachtagung Kommunikation in Verteilten Systemen (KiVS 2007) Bern, Schweiz, 26. Februar–2. März 2007
External Links
Snippet
SSL/TLS has been designed to protect authenticity, integrity, and confidentiality. However, considering the possibility of TCP data injection, as described in, it becomes obvious that this protocol is vulnerable to DoS attacks just because it is layered upon TCP. In this paper …
- 235000010384 tocopherol 0 abstract description 82
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US8745723B2 (en) | System and method for providing unified transport and security protocols | |
| Touch | Defending TCP against spoofing attacks | |
| Duong et al. | Here come the⊕ ninjas | |
| Rescorla et al. | Datagram transport layer security | |
| US7353380B2 (en) | Method and apparatus for providing secure streaming data transmission facilities using unreliable protocols | |
| JP4504713B2 (en) | How to authenticate the packet payload | |
| JP4271451B2 (en) | Method and apparatus for fragmenting and reassembling Internet key exchange data packets | |
| WO2004017552A2 (en) | Establishing authenticated network connections | |
| WO2006091396A2 (en) | Payload layer security for file transfer | |
| Jadin et al. | Securing multipath TCP: Design & implementation | |
| Aboba et al. | Securing block storage protocols over ip | |
| US7536719B2 (en) | Method and apparatus for preventing a denial of service attack during key negotiation | |
| Chen et al. | Secure communication channel establishment: TLS 1.3 (over TCP fast open) vs. QUIC | |
| Chen et al. | Secure communication channel establishment: TLS 1.3 (over TCP fast open) versus QUIC | |
| Barham et al. | Techniques for lightweight concealment and authentication in IP networks | |
| Rescorla et al. | Rfc 4347: Datagram transport layer security | |
| Völker et al. | Secure TLS: preventing DoS attacks with lower layer authentication | |
| Thalhammer | Security inVoIP-Telephony Systems | |
| Limniotis et al. | Cryptography threats | |
| Tsudik | Datagram authentication in internet gateways: implications of fragmentation and dynamic routing | |
| Mahboob et al. | Transport Layer Security (TLS)–A Network Security Protocol for E-commerce | |
| Budzko et al. | Analysis of the level of security provided by advanced information and communication technologies | |
| Heer | LHIP–Lightweight Authentication for the Host Identity Protocol | |
| Schafer | Introduction to Network Security | |
| Kruegel et al. | Internet security |