
{"id":2864,"date":"2010-09-07T01:58:08","date_gmt":"2010-09-06T20:28:08","guid":{"rendered":"http:\/\/www.jeffrin.in\/?p=2864"},"modified":"2010-09-07T01:58:08","modified_gmt":"2010-09-06T20:28:08","slug":"ip-puzzles","status":"publish","type":"post","link":"https:\/\/www.trueangle.org\/index.php\/2010\/09\/07\/ip-puzzles\/","title":{"rendered":"IP Puzzles +"},"content":{"rendered":"<p><a href=\"https:\/\/beautifulworknew.wordpress.com\/wp-content\/uploads\/2021\/03\/d8ca6-ippuzzles1.png\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/beautifulworknew.wordpress.com\/wp-content\/uploads\/2021\/03\/d8ca6-ippuzzles1.png?w=300\" alt=\"\" title=\"ippuzzles\" width=\"300\" height=\"225\" class=\"alignnone size-medium wp-image-2875\" \/><\/a><\/p>\n<pre>\nAmidst the traffic of the Internet is an enormous amount of undesirable communication.\nCurrently there is no significant disincentive for clients who contribute to this\nflood of undesirable communication. A mechanism for punishing only the malicious\nis required in order to discourage clients from behaving badly. The standard response\nhas been to disconnect clients exhibiting suspicious behavior from the rest of the\nnetwork using a binary fillter. Ideally though, the mechanism should be analog to\nallow falsely identified clients to prove that they are legitimate, so that service to\nthem can be reinstated. Client puzzles have been proposed in several protocols as a\nmechanism well suited for this task;  clients do all the work involved in proving their\nlegitimacy.\n<\/pre>\n<pre>\nReference :\nReducing Malicious Traffic With IP Puzzles\nEd Kaiser Wu-chang Feng Wu-chi Feng Antoine Luu\nOGI@OHSU\nENSEIRB\n{edkaiser, wuchang, wuchi}@cse.ogi.edu\nluu@enseirb.fr\n\n<\/pre>\n","protected":false},"excerpt":{"rendered":"<p>Amidst the traffic of the Internet is an enormous amount of undesirable communication. Currently there is no significant disincentive for clients who contribute to this flood of undesirable communication. A mechanism for punishing only the malicious is required in order to discourage clients from behaving badly. The standard response has been to disconnect clients exhibiting &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.trueangle.org\/index.php\/2010\/09\/07\/ip-puzzles\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;IP Puzzles +&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[772,971,1035,1158,1424],"_links":{"self":[{"href":"https:\/\/www.trueangle.org\/index.php\/wp-json\/wp\/v2\/posts\/2864"}],"collection":[{"href":"https:\/\/www.trueangle.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trueangle.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trueangle.org\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trueangle.org\/index.php\/wp-json\/wp\/v2\/comments?post=2864"}],"version-history":[{"count":0,"href":"https:\/\/www.trueangle.org\/index.php\/wp-json\/wp\/v2\/posts\/2864\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.trueangle.org\/index.php\/wp-json\/wp\/v2\/media?parent=2864"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trueangle.org\/index.php\/wp-json\/wp\/v2\/categories?post=2864"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.trueangle.org\/index.php\/wp-json\/wp\/v2\/tags?post=2864"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}