1997
DOI: 10.1007/bfb0028465
|View full text |Cite
|
Sign up to set email alerts
|

Stateless connections

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
36
0

Year Published

2001
2001
2010
2010

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 57 publications
(36 citation statements)
references
References 5 publications
0
36
0
Order By: Relevance
“…It is important to prevent a malicious user or third party from tampering with server state in order to extract an unfair share of the service, to waste bandwidth, to launch a DDoS attack, or to force the server to execute an invalid state [Aura and Nikander 1997]. Such attacks might employ two mechanisms: modifying the server state-because it is no longer secured on the server, and performing replay attacks-because statelessness inherently admits replay of old packets.…”
Section: Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…It is important to prevent a malicious user or third party from tampering with server state in order to extract an unfair share of the service, to waste bandwidth, to launch a DDoS attack, or to force the server to execute an invalid state [Aura and Nikander 1997]. Such attacks might employ two mechanisms: modifying the server state-because it is no longer secured on the server, and performing replay attacks-because statelessness inherently admits replay of old packets.…”
Section: Securitymentioning
confidence: 99%
“…Aura and Nikander [1997] describe a general framework for converting stateful protocols to stateless protocols, and apply it to authentication protocols. Since this framework assumes that the underlying communication channel is reliable, it is not directly applicable to a high-performance transport protocol.…”
Section: Related Workmentioning
confidence: 99%
“…Problems with the usage of public-key-based cryptosystems in protocols are described in [AN97] and in [ALN00].…”
Section: Tschofenig and Kroeselberg Informational [Page 13]mentioning
confidence: 99%
“…Cookie-based solutions [36] were used against TCP connection-depletion (also known as TCP SYN) attacks [45,23], and in security protocols such as Photuris [32], IKE [22], JFK [2], and others [39,24]. More generally, The advantages of being stateless, at least in the beginning of a protocol run, were recognized in the context of security protocols in [27] and [4].…”
Section: Related Work On Puzzlesmentioning
confidence: 99%