Defeating DDoS attacks by fixing the incentive chain

被引:31
|
作者
Huang, Yun [1 ]
Geng, Xianjun [2 ]
Whinston, Andrew B. [1 ]
机构
[1] Univ Texas Austin, Ctr Res Electron Commerce, Dept Informat Risk & Operat Management, McCombs Sch Business, Austin, TX 78712 USA
[2] Univ Washington, Sch Business, Seattle, WA 98195 USA
关键词
design; economics; measurement; reliability; security; denial-of-service; incentive; pricing;
D O I
10.1145/1189740.1189745
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cooperative technological solutions for Distributed Denial-of-Service (DDoS) attacks are already available, yet organizations in the best position to implement them lack incentive to do so, and the victims of DDoS attacks cannot find effective methods to motivate them. In this article we discuss two components of the technological solutions to DDoS attacks: cooperative filtering and cooperative traffic smoothing by caching. We then analyze the broken incentive chain in each of these technological solutions. As a remedy, we propose usage-based pricing and Capacity Provision Networks, which enable victims to disseminate enough incentive along attack paths to stimulate cooperation against DDoS attacks.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] Towards Defeating DDoS Attacks
    Doyal, Alex
    Zhan, Justin
    Yu, Huiming Anna
    2012 ASE INTERNATIONAL CONFERENCE ON CYBER SECURITY (CYBERSECURITY), 2012, : 209 - 212
  • [2] Unified rate limiting in broadband access networks for defeating internet worms and DDoS attacks
    Park, Keun
    Seo, Dongwon
    Yoo, Jaewon
    Lee, Heejo
    Kim, Hyogon
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2008, 4991 : 176 - 187
  • [3] A PBNM and economic incentive-based defensive mechanism against DDoS attacks
    Dahiya, Amrita
    Gupta, B. B.
    ENTERPRISE INFORMATION SYSTEMS, 2022, 16 (03) : 406 - 426
  • [4] DDoS Attacks Detection and Mitigation Using Economic Incentive-Based Solution
    Dahiya, Amrita
    Gupta, B. B.
    FIRST INTERNATIONAL CONFERENCE ON SUSTAINABLE TECHNOLOGIES FOR COMPUTATIONAL INTELLIGENCE, 2020, 1045 : 729 - 738
  • [5] Defeating DDoS using Productive Puzzles
    Abliz, Mehmud
    Znati, Taieb F.
    2015 INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2015, : 114 - 123
  • [6] Routing Around Congestion Defeating DDoS Attacks and Adverse Network Conditions via Reactive BGP Routing
    Smith, Jared M.
    Schuchard, Max
    2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, : 599 - 617
  • [7] IMPLEMENTING BLOCK CHAIN SECURITY TO PREVENT DDOS ATTACKS IN NETWORKS
    Ashu
    Mahajan, Rashima
    Zafar, Sherin
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2019, 13 (04): : 27 - 40
  • [8] THROTTLING DDoS ATTACKS
    Gujjunoori, Saraiah
    Syed, Taqi Ali
    Madhu, Babu J.
    Avinash, D.
    Mohandas, Radhesh
    Pais, Alwyn R.
    SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 121 - +
  • [9] Web attacks: defeating monetisation attempts
    Nguyen V.-L.
    Lin P.-C.
    Hwang R.-H.
    Network Security, 2019, 2019 (05): : 11 - 19
  • [10] Defeating MageCart Attacks in a NAISS Way
    Rus, Catalin
    Sarmah, Dipti Kapoor
    El-Hajj, Mohammed
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 691 - 697