The economics of network management
Communications of the ACM
End-to-end arguments in system design
ACM Transactions on Computer Systems (TOCS)
Defending wireless infrastructure against the challenge of DDoS attacks
Mobile Networks and Applications
Defeating Distributed Denial of Service Attacks
IT Professional
Information Systems Research
Assessing the Risk in E-commerce
HICSS '02 Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 7 - Volume 7
DSN '04 Proceedings of the 2004 International Conference on Dependable Systems and Networks
Mitigating bandwidth-exhaustion attacks using congestion puzzles
Proceedings of the 11th ACM conference on Computer and communications security
Internet Denial of Service: Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security)
The effectiveness of request redirection on CDN robustness
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
SkipNet: a scalable overlay network with practical locality properties
USITS'03 Proceedings of the 4th conference on USENIX Symposium on Internet Technologies and Systems - Volume 4
Defending against flooding-based distributed denial-of-service attacks: a tutorial
IEEE Communications Magazine
An economic mechanism for better Internet security
Decision Support Systems
DDoS mitigation in non-cooperative environments
NETWORKING'08 Proceedings of the 7th international IFIP-TC6 networking conference on AdHoc and sensor networks, wireless networks, next generation internet
How the public views strategies designed to reduce the threat of botnets
TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
Secure virtualization for cloud computing
Journal of Network and Computer Applications
Hi-index | 0.00 |
Cooperative technological solutions for Distributed Denial-of-Service (DDoS) attacks are already available, yet organizations in the best position to implement them lack incentive to do so, and the victims of DDoS attacks cannot find effective methods to motivate them. In this article we discuss two components of the technological solutions to DDoS attacks: cooperative filtering and cooperative traffic smoothing by caching. We then analyze the broken incentive chain in each of these technological solutions. As a remedy, we propose usage-based pricing and Capacity Provision Networks, which enable victims to disseminate enough incentive along attack paths to stimulate cooperation against DDoS attacks.