Using Self-interest to Prevent MaliceFixing the Denial of Service Flaw of the Internet

نویسندگان

  • Bob Briscoe
  • bob. briscoe
چکیده

This paper describes the economic intent of a proposed change to the Internet protocol. Denial of service is the extreme of a spectrum of anti-social behaviour problems it aims to solve, but without unduly restricting unexpected new uses of the Internet. By internalising externalities and removing information asymmetries it should trigger evolutionary deployment of protections for Internet users. To be worthwhile architectural change must solve the last stages of the arms race, not just the next. So we work through the competitive process to show the solution will eventually block attacks that other researchers consider unsolvable, and that it creates the right incentives to drive its own deployment, from bootstrap through to completion. It also encourages deployment of complementary solutions, not just our own. Interestingly, small incentives in the lower layer infrastructure market amplify to ensure operators block attacks worth huge sums on the black market in the upper layers.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

HF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets

Abstract—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks. Such attacks with the occupation of system resources, have proven to be an effective method of denying network services. Botnets that launch HTTP packet flood attacks agains...

متن کامل

On The Plausible Deniability Feature of Internet Protocols

We present an examination of a design feature named “plausible deniability” which has been widely adopted in key exchange protocols, in particular, in IKEv2 and in signature-based modes of IKE. We expose an authentication flaw in these modes of IKE and IKEv2 which is due in part to the presence of this plausible deniability feature. The flaw is also present in the protocols SIGMA [18] and Σ0, Σ...

متن کامل

Advanced operations research techniques for multi-constraint QoS routing in internet

Internet Traffic has grown exponentially over last few years due to provision of multiple class services through Internet backbone. With the explosive use of Internet, contemporary Internet routers are susceptible to overloads and their services deteriorate drastically and often cause denial of services. In this paper, an analysis is made how forecasting technique, routing algorithm and Genetic...

متن کامل

Intrusion Detection in IOT based Networks Using Double Discriminant Analysis

Intrusion detection is one of the main challenges in wireless systems especially in Internet of things (IOT) based networks. There are various attack types such as probe, denial of service, remote to local and user to root. In addition to known attacks and malicious behaviors, there are various unknown attacks that some of them have similar behavior with respect to each other or mimic the norma...

متن کامل

The Use of Data Envelopment Analysis in the Design of Internet Networks to Ensure the Quality of Service

Choosing a superior Internet network by users or providing a desirable Internet network by ISPs is always one of the important decision issues in this area. Choosing a unique optimal network from among the best networks is still a big challenge. The purpose of this paper is to use the data envelopment analysis (DEA) decision-making technique to evaluate the existing Internet networks in order t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006