Combating Informational Denial-of-Service (IDoS) Attacks: Modeling and Mitigation of Attentional Human Vulnerability

نویسندگان

چکیده

This work proposes a new class of proactive attacks called the Informational Denial-of-Service (IDoS) that exploit attentional human vulnerability. By generating large volume feints, IDoS deplete cognitive resources operators to prevent humans from identifying real hidden among feints. aims formally define attacks, quantify their consequences, and develop human-assistive security technologies mitigate severity level risks attacks. To this end, we use semi-Markov process model sequential arrivals feints with category labels attached in associated alerts. The assistive technology strategically manages attention by highlighting selective alerts periodically distraction other A data-driven approach is applied evaluate performance under different Attention Management (AM) strategies. Under representative special case, establish computational equivalency between two dynamic programming representations reduce computation complexity enable online learning samples reduced size zero delays. case study corroborates effectiveness framework. numerical results illustrate how AM strategies can alleviate risk Furthermore, show minimum achieved proper intentional inattention alerts, which refer as law rational risk-reduction inattention.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Complementary Architectures for Preventing and Combating Denial-of-Service Attacks

Years after their first appearance, Denial-of-Service (DoS) attacks continue to grow and the motivation behind them has become criminal. The research community has brought forward numerous proposals to the problem, but most of them, despite their technical merit, have encountered difficult deployment problems. Commercial solutions and services exist, but they are only affordable to large instit...

متن کامل

Denial of Service Attacks

Denial of service attacks are not new. However, the recent increase of their power and their use by organized criminal organizations make necessary to consider them as one of the major issues IT infrastructures will have to face in the next few years. Trying to defeat those attacks without understanding their technical aspects is illusory. As such, this document intends to provide as much detai...

متن کامل

Denial of Service Attacks

................................................................................................................................................................4

متن کامل

Denial-of-Service Attacks

Availability requires that computer systems function normally without loss of resources to legitimate users. One of the most challenging issues to availability is the denial-ofservice (DoS) attack. DoS attacks constitute one of the major threats and among the hardest security problems in today’s Internet. The main aim of a DoS is the disruption of services by attempting to limit access to a mac...

متن کامل

Modeling Distributed Denial of Service Attacks and Defenses

Distributed denial of service (DDOS) attacks have emerged as a prevalent way to take down web sites and have imposed financial losses to companies. The CSI/FBI survey (CSI 2001) shows that 36% of respondents in the last 12-months period have detected denial of service, which imposed more than $4.2 million financial losses. The effectiveness of DDOS defenses depends on many factors such that the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2021

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-030-90370-1_17