+

Völker et al., 2007 - Google Patents

Secure TLS: preventing DoS attacks with lower layer authentication

Völker et al., 2007

View PDF
Document ID
5469778491591508532
Author
Völker L
Schöller M
Publication year
Publication venue
Kommunikation in Verteilten Systemen (KiVS) 15. Fachtagung Kommunikation in Verteilten Systemen (KiVS 2007) Bern, Schweiz, 26. Februar–2. März 2007

External Links

Snippet

SSL/TLS has been designed to protect authenticity, integrity, and confidentiality. However, considering the possibility of TCP data injection, as described in, it becomes obvious that this protocol is vulnerable to DoS attacks just because it is layered upon TCP. In this paper …
Continue reading at www.researchgate.net (PDF) (other versions)

Similar Documents

Publication Publication Date Title
US8745723B2 (en) System and method for providing unified transport and security protocols
Touch Defending TCP against spoofing attacks
Duong et al. Here come the⊕ ninjas
Rescorla et al. Datagram transport layer security
US7353380B2 (en) Method and apparatus for providing secure streaming data transmission facilities using unreliable protocols
JP4504713B2 (en) How to authenticate the packet payload
JP4271451B2 (en) Method and apparatus for fragmenting and reassembling Internet key exchange data packets
WO2004017552A2 (en) Establishing authenticated network connections
WO2006091396A2 (en) Payload layer security for file transfer
Jadin et al. Securing multipath TCP: Design & implementation
Aboba et al. Securing block storage protocols over ip
US7536719B2 (en) Method and apparatus for preventing a denial of service attack during key negotiation
Chen et al. Secure communication channel establishment: TLS 1.3 (over TCP fast open) vs. QUIC
Chen et al. Secure communication channel establishment: TLS 1.3 (over TCP fast open) versus QUIC
Barham et al. Techniques for lightweight concealment and authentication in IP networks
Rescorla et al. Rfc 4347: Datagram transport layer security
Völker et al. Secure TLS: preventing DoS attacks with lower layer authentication
Thalhammer Security inVoIP-Telephony Systems
Limniotis et al. Cryptography threats
Tsudik Datagram authentication in internet gateways: implications of fragmentation and dynamic routing
Mahboob et al. Transport Layer Security (TLS)–A Network Security Protocol for E-commerce
Budzko et al. Analysis of the level of security provided by advanced information and communication technologies
Heer LHIP–Lightweight Authentication for the Host Identity Protocol
Schafer Introduction to Network Security
Kruegel et al. Internet security
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载