FDNA '03 Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture
Design and analysis of a replicated elusive server scheme for mitigating denial of service attacks
Journal of Systems and Software - Special issue: Performance modeling and analysis of computer systems and networks
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
ACM Transactions on Computer Systems (TOCS)
Proofs of communication and its application for fighting spam
SOFSEM'08 Proceedings of the 34th conference on Current trends in theory and practice of computer science
Combating spam and denial-of-service attacks with trusted puzzle solvers
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
OverCourt: DDoS mitigation through credit-based traffic segregation and path migration
Computer Communications
Reconstructing hash reversal based proof of work schemes
LEET'11 Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats
A secure distance-based RFID identification protocol with an off-line back-end database
Personal and Ubiquitous Computing
DDoS defense mechanisms: a new taxonomy
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
How well can congestion pricing neutralize denial of service attacks?
Proceedings of the 12th ACM SIGMETRICS/PERFORMANCE joint international conference on Measurement and Modeling of Computer Systems
Adaptive selective verification: an efficient adaptive countermeasure to thwart DoS attacks
IEEE/ACM Transactions on Networking (TON)
Hi-index | 0.00 |
Distributed Denial of Service (DDoS) attacks exploit theacute imbalance between client and server workloads tocause devastation to the service providers. We propose adistributed gateway architecture and a payment protocolthat imposes dynamically changing prices on bothnetwork, server, and information resources in order topush some cost of initiating service requests - in termsof monetary payments and/or computational burdens -back onto the requesting clients. By employing differentprice and purchase functions, the architecture canprovide service quality differentiation and furthermore,select good client behavior and discriminate againstadversarial behavior. If confirmed by additional experiments,judicious partitioning of resources using differentpricing functions can improve overall service survivability.