Towards attack-agnostic defenses

作者: Dawn Song , David Brumley

DOI:

关键词:

摘要: Internet attackers control hundreds of thousands to perhaps millions computers, which they can use for a variety different attacks. Common attacks include spam delivery, phishing, and DDoS. The current research community focus is on defenses each specific attack type compromised hosts may launch. However, attack-specific approaches almost always have two fundamental drawbacks: do not address the root problem that an army hosts, provide right incentives users properly secure their machines. As result, be defeated by new attacks, even those only slightly from old attacks. We argue researchers should also attackagnostic whose effectiveness does depend particular type. We initiate this line investigating design space attack-agnostic defenses, then detailing extreme points within space: InternetWatch List Reputation System.

参考文章(11)
David Dagon, Cliff Changchun Zou, Wenke Lee, Modeling Botnet Propagation Using Time Zones. network and distributed system security symposium. ,(2006)
Dawn Song, Adrian Perrig, Steven Michael Bellovin, David D. Clark, A Clean-Slate Design for the Next-Generation Secure Internet ,(2006) , 10.7916/D8BV7PCM
Dan Boneh, Hovav Shacham, Group signatures with verifier-local revocation computer and communications security. pp. 168- 177 ,(2004) , 10.1145/1030083.1030106
Alice Cheng, Eric Friedman, Sybilproof reputation mechanisms acm special interest group on data communication. pp. 128- 132 ,(2005) , 10.1145/1080192.1080202
A. Yaar, A. Perrig, D. Song, SIFF: a stateless Internet flow filter to mitigate DDoS flooding attacks ieee symposium on security and privacy. pp. 130- 143 ,(2004) , 10.1109/SECPRI.2004.1301320
Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik, A Practical and Provably Secure Coalition-Resistant Group Signature Scheme international cryptology conference. pp. 255- 270 ,(2000) , 10.1007/3-540-44598-6_16
Harlan Yu, J. Rexford, E.W. Felten, A distributed reputation approach to cooperative Internet routing protection international conference on network protocols. pp. 73- 78 ,(2005) , 10.1109/NPSEC.2005.1532057
Kevin Walsh, Emin Gün Sirer, Fighting peer-to-peer SPAM and decoys with object reputation acm special interest group on data communication. pp. 138- 143 ,(2005) , 10.1145/1080192.1080204
Dawn Xiaodong Song, Practical forward secure group signature schemes Proceedings of the 8th ACM conference on Computer and Communications Security - CCS '01. pp. 225- 234 ,(2001) , 10.1145/501983.502015
Pekka Nikander, Petri Jokela, Robert Moskowitz, Thomas R. Henderson, Host Identity Protocol RFC. ,vol. 5201, pp. 1- 104 ,(2008)