The search functionality is under construction.

IEICE TRANSACTIONS on Communications

Open Access
Pay the Piper: DDoS Mitigation Technique to Deter Financially-Motivated Attackers

Takayuki SASAKI, Carlos HERNANDEZ GAÑÁN, Katsunari YOSHIOKA, Michel VAN EETEN, Tsutomu MATSUMOTO

  • Full Text Views

    41

  • Cite this
  • Free PDF (2MB)

Summary :

Distributed Denial of Service attacks against the application layer (L7 DDoS) are among the most difficult attacks to defend against because they mimic normal user behavior. Some mitigation techniques against L7 DDoS, e.g., IP blacklisting and load balancing using a content delivery network, have been proposed; unfortunately, these are symptomatic treatments rather than fundamental solutions. In this paper, we propose a novel technique to disincentivize attackers from launching a DDoS attack by increasing attack costs. Assuming financially motivated attackers seeking to gain profit via DDoS attacks, their primary goal is to maximize revenue. On the basis of this assumption, we also propose a mitigation solution that requires mining cryptocurrencies to access servers. To perform a DDoS attack, attackers must mine cryptocurrency as a proof-of-work (PoW), and the victims then obtain a solution to the PoW. Thus, relative to attackers, the attack cost increases, and, in terms of victims, the economic damage is compensated by the value of the mined coins. On the basis of this model, we evaluate attacker strategies in a game theory manner and demonstrate that the proposed solution provides only negative economic benefits to attackers. Moreover, we implement a prototype to evaluate performance, and we show that this prototype demonstrates practical performance.

Publication
IEICE TRANSACTIONS on Communications Vol.E103-B No.4 pp.389-404
Publication Date
2020/04/01
Publicized
2019/11/12
Online ISSN
1745-1345
DOI
10.1587/transcom.2019NRP0001
Type of Manuscript
Special Section PAPER (Special Section on Network Resource Control and Management Technologies for Sustainable Social Information Infrastructure)
Category

Authors

Takayuki SASAKI
  Yokohama National University
Carlos HERNANDEZ GAÑÁN
  TU Delft
Katsunari YOSHIOKA
  Yokohama National University
Michel VAN EETEN
  TU Delft
Tsutomu MATSUMOTO
  Yokohama National University

Keyword