Abstract
AbstractDistributed Denial-of-Service (DDoS) attacks are one of the major causes of concerns for communication service providers. When an attack is highly sophisticated and no countermeasures are available directly, sharing hardware and defense capabilities become a compelling alternative. Future network and service management can base its operations on equally distributed systems to neutralize highly distributed DDoS attacks. A cooperative defense allows for the combination of detection and mitigation capabilities, the reduction of overhead at a single point, and the blockage of malicious traffic near its source. Main challenges impairing the widespread deployment of existing cooperative defense are: (a) high complexity of operation and coordination, (b) need for trusted and secure communications, (c) lack of incentives for service providers to cooperate, and (d) determination on how operations of these systems are affected by different legislation, regions, and countries. The cooperative Blockchain Signaling System (BloSS) defines an effective and alternative solution for security management, especially cooperative defenses, by exploiting Blockchains (BC) and Software-Defined Networks (SDN) for sharing attack information, an exchange of incentives, and tracking of reputation in a fully distributed and automated fashion. Therefore, BloSS was prototyped and evaluated through a global experiment, without the burden to maintain, design, and develop special registries and gossip protocols.
Funder
University of Zurich and the Horizon 2020 CONCORDIA Project
University of Zurich
Publisher
Springer Science and Business Media LLC
Subject
Strategy and Management,Computer Networks and Communications,Hardware and Architecture,Information Systems
Reference57 articles.
1. Akamai. How to protect against ddos attacks—stop denial of service
2. Felici, M., Wainwright, N., Cavallini, S., Bisogni, F.: What’s new in the economics of cybersecurity? IEEE Secur. Privacy 14, 11–13 (2016)
3. IoTAnalytics. State of the IoT 2018: number of IoT devices now at 7B—Market accelerating, Fev (2018)
4. Akamai. The state of the internet (2020)
5. Maglaras, L., Kim, K.H., Janicke, H., Ferrag, M.A.,Rallis, S., Fragkou, P., Maglaras, A., Cruz, T.J.: Cyber security of critical infrastructures, vol. 4. ICT Express,, SI: CI and Smart Grid Cyber Security, pp. 42–45, (2018)
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Demo: Secure Inventorying and Lifecycle Management of IoT Devices with DLT;2024 IEEE 49th Conference on Local Computer Networks (LCN);2024-10-08
2. A Repeated Game-Based Distributed Denial of Service Attacks Mitigation Method for Mining Pools;Electronics;2024-01-18
3. A Review on Detection and Prevention of the DDoS Attacks in the Blockchain;2023 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS);2023-11-03
4. Deciphering DDoS Attacks Through a Global Lens;2023 19th International Conference on Network and Service Management (CNSM);2023-10-30
5. Securing the Networks Against DDoS Attacks Using Blockchain Technology;International Conference on Innovative Computing and Communications;2023