Using IBE Key Distribution Strategies to Development of DDoS Attack Detection and Prevention
- DOI
- 10.2991/icetis-13.2013.210How to use a DOI?
- Keywords
- DDoS; IBE; Key distribution
- Abstract
System based on public key of the certificate biggest problem is the management of the certificate, the certificate inside bind the user ID and the user's public key. To solve this problem, some researchers have proposed the identity-based IBE public key system. The DDoS attacks performer, can be any type of network node. Based on the user's private key distribution scheme identity-based cryptogram system, will give an escrow agent system private key escrow, users have at least a proxy information fragments collected can calculate their private key. The paper proposes using IBE key distribution strategies to development of DDoS attack detection and prevention.
- Copyright
- © 2013, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Qing Tan PY - 2013/06 DA - 2013/06 TI - Using IBE Key Distribution Strategies to Development of DDoS Attack Detection and Prevention BT - Proceedings of the 2013 the International Conference on Education Technology and Information System (ICETIS 2013) PB - Atlantis Press SP - 924 EP - 927 SN - 1951-6851 UR - https://doi.org/10.2991/icetis-13.2013.210 DO - 10.2991/icetis-13.2013.210 ID - Tan2013/06 ER -