An Economic Incentive-Based Risk Transfer Approach for Defending Against DDoS Attacks

An Economic Incentive-Based Risk Transfer Approach for Defending Against DDoS Attacks

Amrita Dahiya, Brij B. Gupta
Copyright: © 2020 |Pages: 25
DOI: 10.4018/IJESMA.2020070104
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Volumetric DDoS attacks are continued to be an immense threat to e-commerce and other online businesses from the last decade as attackers have much resources to amplify scale and frequency day by day. Despite significant efforts by research community and security professionals, we are lacking a robust solution against DDoS attacks. Generally, the attacker's investment in sending large amount of traffic to paralyze a system is negligible as compared to the loss they caused to an organization. Therefore, in this article, a risk transfer approach, a combination of techno-economic aspects is proposed where the risk of being attacked is transferred to some cooperating ISPs in return for economic incentives. In the proposed approach, user's attention, cash, other network and computational resources are contemplated as valuable resources. User must have consent from server in the form of “Sending Rights” which can be obtained by solving cryptographic puzzle (computational work) or by purchasing through micropayment or combination of both according to traffic load level. Our proposed solution is implemented on PN2sim simulator and then verified on SPIN model checker. Implementation results show the supremacy of our proposed approach.
Article Preview
Top

1. Introduction

The area of network defense is a vast domain and continuously gaining attention from research community. There has been a tremendous evolution in the attack size, attacking tools, methods and techniques. Traditionally, network defense system consists of either firewalls or Intrusion Detection Systems (IDSs) which provide a certain level of protection to some extent and there is no denying in the fact that attackers can easily bypass these devices by appearing to be a legitimate one to the victim. DDoS attack always takes advantage of the critical misalignment of traffic load and resources between the client and server (Gupta & Badve, 2016; Wang et.al., 2018; Bhardwaj & Goundar, 2017; Kaushik & Gandhi, 2019). DDoS attack is an attempt to make an online service unavailable to the legitimate users by astounding the server with traffic from multiple sources crippling down the speed of server (Alomari, et al., 2016; Almomani, et al., 2013; Chhabra, et al., 2013; Gupta, et al., 2018).

From the last decade, academicians have proposed various solutions ranging from filtering mechanisms (Kalkan et al., 2016), overlay based solutions (Kaur et al., 2017) to capability-based solutions (Liu et.al., 2016) and other approaches (De Assis et al., 2017; Rodrigues et al., 2017). There are a lot of defense mechanisms exist which offer exceptional protection from a specific type of attack, but we lack a cooperative and distributed defensive mechanism that can be deployed widely all over the Internet. Moreover, Internet security is highly driven by sharing of data related to security breaches and cyber-attacks. Sharing data can help in quantifying cyber risks more effectively (Al Quhtani, 2017; Bredmar, 2017; Pejić Bach et al., 2017; Horvat et al., 2014). Sharing data can help pro-active defense mechanisms to learn about previous methods of carrying out attacks. But there exist very less incentives for organizations to share data (Moore, 2019).

A new record had been set in February 2018 when DDoS attack of size 1.3 Tbps was carried out against GitHub. This record was broken just after five days when a DDoS attack of size 1.7 Tbps was performed against a US based telecommunication company (Skottler, 2018). It was a memcached attack. Major DDoS attack of size 620 Gbps occurred in 2016 where a huge network of things (IoT) was converted into a botnet named MIRAI and used against a company DYN. There is another high trend in 2017 where a ransom driven DDoS is launched against big enterprises (KSN, 2017). According to a 2017 report from Cisco, there will be a rise in number of DDoS attacks to 3.1 million by 2021 which will exceed 1 Gbps of traffic. According to “Visual Networking Index Complete Forecast Update, 2015-2020” published by CISCO (Stephanie, 2018), the number of DDoS attacks grew 25 percent in 2015 and will increase 2.6-fold to 17 million by 2020. There is a need to understand the fact that DDoS attack can still be a threat to an enterprise despite having all precautionary measures, if the enterprise's DNS provider, ISP or hosting service providers are not secured against DDoS attack (Gupta, 2011; Gupta, et al., 2012; Chaudhary, et al., 2018).

Complete Article List

Search this Journal:
Reset
Volume 16: 1 Issue (2024)
Volume 15: 1 Issue (2023)
Volume 14: 4 Issues (2022): 1 Released, 3 Forthcoming
Volume 13: 4 Issues (2021)
Volume 12: 4 Issues (2020)
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing