Pay the Piper: DDoS mitigation technique to deter financially-motivated attackers

Takayuki Sasaki, Carlos Hernandez Gañán, Katsunari Yoshioka, Michel Van Eeten, Tsutomu Matsumoto

Research output: Contribution to journalArticleScientificpeer-review

22 Downloads (Pure)

Abstract

Distributed Denial of Service attacks against the application layer (L7 DDoS) are among the most difficult attacks to defend against because they mimic normal user behavior. Some mitigation techniques against L7 DDoS, e.g., IP blacklisting and load balancing using a content delivery network, have been proposed; unfortunately, these are symptomatic treatments rather than fundamental solutions. In this paper, we propose a novel technique to disincentivize attackers from launching a DDoS attack by increasing attack costs. Assuming financially motivated attackers seeking to gain profit via DDoS attacks, their primary goal is to maximize revenue. On the basis of this assumption, we also propose a mitigation solution that requires mining cryptocurrencies to access servers. To perform a DDoS attack, attackers must mine cryptocurrency as a proof-of-work (PoW), and the victims then obtain a solution to the PoW. Thus, relative to attackers, the attack cost increases, and, in terms of victims, the economic damage is compensated by the value of the mined coins. On the basis of this model, we evaluate attacker strategies in a game theory manner and demonstrate that the proposed solution provides only negative economic benefits to attackers. Moreover, we implement a prototype to evaluate performance, and we show that this prototype demonstrates practical performance.

Original languageEnglish
Pages (from-to)389-404
Number of pages16
JournalIEICE Transactions on Communications
VolumeE103B
Issue number4
DOIs
Publication statusPublished - 2020

Keywords

  • DDoS
  • Financially-motivated attackers
  • Proof of work

Fingerprint Dive into the research topics of 'Pay the Piper: DDoS mitigation technique to deter financially-motivated attackers'. Together they form a unique fingerprint.

Cite this