Affiliation:
1. National Institute of Technology, Kurukshetra, India
Abstract
Volumetric DDoS attacks are continued to be an immense threat to e-commerce and other online businesses from the last decade as attackers have much resources to amplify scale and frequency day by day. Despite significant efforts by research community and security professionals, we are lacking a robust solution against DDoS attacks. Generally, the attacker's investment in sending large amount of traffic to paralyze a system is negligible as compared to the loss they caused to an organization. Therefore, in this article, a risk transfer approach, a combination of techno-economic aspects is proposed where the risk of being attacked is transferred to some cooperating ISPs in return for economic incentives. In the proposed approach, user's attention, cash, other network and computational resources are contemplated as valuable resources. User must have consent from server in the form of “Sending Rights” which can be obtained by solving cryptographic puzzle (computational work) or by purchasing through micropayment or combination of both according to traffic load level. Our proposed solution is implemented on PN2sim simulator and then verified on SPIN model checker. Implementation results show the supremacy of our proposed approach.
Subject
Marketing,Strategy and Management,Computer Networks and Communications,Computer Science Applications,Management Information Systems
Reference52 articles.
1. A Survey of Botnet-Based DDoS Flooding Attacks of Application Layer
2. Data Mining Usage in Corporate Information Security: Intrusion Detection Applications
3. Almomani, A., Gupta, B. B., Wan, T. C., Altaher, A., & Manickam, S. (2013). Phishing dynamic evolving neural fuzzy framework for online detection zero-day phishing email.
4. Aura, T., Nikander, P., & Leiwo, J. (2000, April). DOS-resistant authentication with client puzzles. In Proceedings of the International workshop on security protocols (pp. 170-177). Springer.
5. Back, A. (2001). Hash cash: A partial hash collision based postage scheme. Retrieved from http://www.hashcash.org
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献