USING STORABLE PROOF OF WORK TO PREVENT DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACK

DDoS attack is a major threat to server performance. This attack works by consuming server capacity, so users cannot access the server. Proof of work can be used to ward off DDoS by forcing attackers to perform large amounts of difficult calculations. The downside of proof of work is that the cli...

Full description

Saved in:
Bibliographic Details
Main Author: Arroisi Mukhlis, Hanif
Format: Final Project
Language:Indonesia
Online Access:https://digilib.itb.ac.id/gdl/view/82233
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Institut Teknologi Bandung
Language: Indonesia
Description
Summary:DDoS attack is a major threat to server performance. This attack works by consuming server capacity, so users cannot access the server. Proof of work can be used to ward off DDoS by forcing attackers to perform large amounts of difficult calculations. The downside of proof of work is that the client must perform the entire protocol for each connection, resulting in lag. Storable proof of work develops classic proof of work by creating proof of work that can be stored early, whenever needed it can be used immediately. The storable proof of work uses symmetric encryption keys and message authentication codes to ensure the security of the protocol. Proof of work has an expiration date so attackers cannot store large amounts of proof of work. To ensure security, storable proof of work requires two external entities, the initiator and minter, which are trusted by the server. The storable proof of work can be further developed to add features such as third-party verification and data association. The storable proof-of-work implementation was created using the Rust programming language and various external cryptographic libraries. The implementation was tested using test suite scripts run on one low end computer and one high end computer. The storable proof of work test was carried out to find the optimum parameters and the effect of the algorithms in the storable proof of work on the generation of proof of work. One of the test results is the equation of the target time for generating proof of work with the difficulty level parameters. Based on tests carried out, the storable proof of work protocol can ward off DDoS attacks and eliminate lag. Storable proof of work is designed to withstand threats such as pre-mining. The difficulty level of proof of work can be set to make it difficult for attackers but not overwhelming for users. The robustness of the storable proof of work can be further improved by selecting a good proof of work algorithm.