Decentralized incentive-based DDoS mitigation

Sara Bitan, Adi Molkho, Alon Dankner

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

DDoS attacks continue to pose a major threat to the Internet's stability. Current solutions are costly and require deployment of dedicated expansive scrubbing centers. We present DDP, an incentive based Decentralized DDoS Protection mechanism that enables operators to apply near attack-source DDoS mitigation, using network devices which are already deployed in their network. DDP is based on blockchain and smart contracts that make all accounting transparent to all participant operators, allowing them to get accurate compensation according to the effort they invest. This is a unique advantage of DDP as it enables operators to charge for protection, providing an incentive for them to participate in DDP. We provide a demo tool that enables us to measure the percentage of filtered attack traffic per the operators' participation percentage. We show that even at participation rate of 50% we get filtration rate of 89.2% and 0% false positive.

Original languageEnglish
Title of host publicationProceedings of the 26th Conference on Innovation in Clouds, Internet and Networks, ICIN 2023
EditorsDiego Lopez, Marie-Jose Montpetit, Walter Cerroni, Mario Di Mauro, Piotr Borylo
PublisherInstitute of Electrical and Electronics Engineers
Pages33-35
Number of pages3
ISBN (Electronic)9798350398045
DOIs
StatePublished - 1 Jan 2023
Event26th Conference on Innovation in Clouds, Internet and Networks, ICIN 2023 - Paris, France
Duration: 6 Mar 20239 Mar 2023

Publication series

NameProceedings of the 26th Conference on Innovation in Clouds, Internet and Networks, ICIN 2023

Conference

Conference26th Conference on Innovation in Clouds, Internet and Networks, ICIN 2023
Country/TerritoryFrance
CityParis
Period6/03/239/03/23

Keywords

  • DDoS attack
  • DRDoS attack
  • Permission based blockchain

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Hardware and Architecture

Fingerprint

Dive into the research topics of 'Decentralized incentive-based DDoS mitigation'. Together they form a unique fingerprint.

Cite this