170 likes | 275 Views
I nnovative Intrusion-Resilient, DDoS -Resistant Authentication System (IDAS) System. Yanjun Zhao. Current Protocols. SSL (Secure Sockets Layer) protocol IPSec(Internet Protocol Security ) suffer from intrusion and single-point ofcompromising
E N D
Innovative Intrusion-Resilient,DDoS-Resistant Authentication System (IDAS) System Yanjun Zhao
Current Protocols • SSL (Secure Sockets Layer) protocol • IPSec(Internet Protocol Security) • suffer from • intrusion and single-point ofcompromising • DDoS(distributed denial ofservice) attacks.
The Purposes of IDAS • protect credential information by distributing shared secret to multiple computers and thus eliminates the single point of compromising. • detect the use of partial credential as a user/computer and indicate which part of secret is exposed
Even when an insider compromised all related servers, the credential is only valid for a short period of time and will be self healed in next period. • A DDoS resistant protocol must be stateless and efficient as well as stop botnet attacks and “low and slow”attacks.
take a single round trip time, which is faster than any other authentication protocols and is important to the performance of critical applications in a multi-continent network.
A legitimate user shares a p, a hash chain value, and a cryptographic key, k_auth, with the Authentication Server. The p represents a second factor for authentication and can be a password, a token, a biometrics, or smartcard. • Partial secrets of the user are provided with two random number seeds: one is for the nonce generation, and the other is for the hash chain seed.
HMAC • HMAC (RFC 2104) is the standard approach in cryptography to ensure the message integrity. • In the context of our authentication protocol, HMAC can be viewed as a fixed-size output produced by two inputs (a message and a secret key). • HMAC is computationally infeasible to produce the valid code without the knowledge of the key.
The proposed scheme combines the usage of a p, a key, and a hash chain in a computation-efficient manner to achieve a strong security level.
If the p is not used in the protocol, when an adversary compromises the device, the attacker can succeed in impersonating the user. • If the HMAC key is not used in the protocol, the update of hash chain value might be tampered by the adversary. Thus, the server and the device will be out of synchronization for authentication. • If the hash chain is not used in the protocol, the adversary compromising the server learns the secret HMAC key and p. Then the adversary can succeed in impersonating a user in next authentication session.
The above steps remove the single-point compromising vulnerability of critical user authentication information. • It is useless for an attacker to compromises one of the two servers. If a strong inside attacker compromises both servers, one can pretend to be a user for the current period. • For the next time period, the attacker loses the required hash chain value and the authentication system self heals.
Reference • Chwan-hwa”John” Wu and Tong Liu Simulation for Intrusion-Resilient, DDoS-Resistant Authentication System (IDAS). SpringSim '08: Proceedings of the 2008 Spring Simulation Multiconference