Seventeenth Annual Computer Security Applications Conference
DOI: 10.1109/acsac.2001.991558
|View full text |Cite
|
Sign up to set email alerts
|

Mitigating distributed denial of service attacks with dynamic resource pricing

Abstract: Distributed Denial of Service (DDoS)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 36 publications
(26 citation statements)
references
References 6 publications
0
25
0
Order By: Relevance
“…In fact, the idea of requiring the user to commit its resources before requesting services was described early by Dwork and Naor [20,21]. As early as about 10 years ago, Mankins et al [18] once introduced dynamic resource pricing models for mitigating distributed denial of service attacks. But their models were conceived under the scenarios with typical TCP/IP architectures, and thus some aspects need to be updated for NDN architecture accordingly.…”
Section: A Prototype Of Economic Model For Ndnmentioning
confidence: 99%
See 2 more Smart Citations
“…In fact, the idea of requiring the user to commit its resources before requesting services was described early by Dwork and Naor [20,21]. As early as about 10 years ago, Mankins et al [18] once introduced dynamic resource pricing models for mitigating distributed denial of service attacks. But their models were conceived under the scenarios with typical TCP/IP architectures, and thus some aspects need to be updated for NDN architecture accordingly.…”
Section: A Prototype Of Economic Model For Ndnmentioning
confidence: 99%
“…As addressed in [18], micropayments can provide a useful side benefit by providing a uniform means of resource accounting, pricing, and arbitration. But micropayments mechanisms must not impose an undue performance penalty.…”
Section: Types Of Micropaymentsmentioning
confidence: 99%
See 1 more Smart Citation
“…To deal with free riding, the underlying idea is that sharing can be encouraged by imposing a cost on the downloads, but ensuring that those who share more freely do not incur this cost, and this way dealing with user selfinterest. In Mankins et al's micropayment scheme [50], published in 2001, users are given an incentive to work together toward a common goal through the introduction of these puzzles. Authors present and evaluate several types of micropayment variants.…”
Section: Recent Approachesmentioning
confidence: 99%
“…Back independently invented "hashcash" [3]. Other applications of Proof-of-Work puzzles include metering visits to websites [15], providing incentives in peer-to-peer systems [27], mitigating (distributed) DoS attacks [21,2,12], rate-limiting TCP connections [18] and defending against Sybil attacks [7]. Finally, Roman et al [26] proposed a scheme that uses pre-challenges to fight spam, in which the pre-challenges can range from, e.g., security questions to micro-payments to CAPTCHAs [30].…”
Section: Cryptographic Puzzlesmentioning
confidence: 99%