Computer and Modernization ›› 2014, Vol. 0 ›› Issue (6): 32-35.

Previous Articles     Next Articles

Analysis of Hash Collsion and DoS Attack in Zend Virtual Machine

  

  1. 1. Department of Computer Science, Yunyang Teachers College, Shiyan 442700, China;

     2. Library, Yunyang Teachers College, Shiyan 442700, China
  • Received:2014-02-27 Online:2014-06-13 Published:2014-06-25

Abstract:

Because the Hash collision loophole exists in server or application, with the loophole an attacker could inject a large amount of useless data to a server and
lead to the CPU process stopover in handling collision data so as to achieve the purpose of the DoS attack. Aiming at such problems, in this essay a simulation algorithm is
presented for the relationship of efficiency and the number of original key about complete collision and no collision in Zend virtual machine. By DJBX33A algorithm and the
structure of two-way linked list for storage collision data, an array containing 2n (n∈[3,31]) elements is created as the test object in PHP, it came to a conclusion about
the relationship between the time of program execution and n in two cases, the results indicated that in two cases, the time of program execution would increase with the n when
n≤16, and When n>16, so did only the second cases. At the same time, the Zend virtual machine DoS attacks are analyzed.

Key words: virtual machine, Hash collision, DoS attack, two-way linked list