Abstract
This paper describes novel market-based technologies for systematic, quantifiable and predictable protection of information systems against attacks. These technologies, incorporated in the MarketNet system, use currency to control access to information systems resources and to account for their use. Clients wishing to access a resource must pay in currency acceptable to the domain that owns it. An attacker must thus pay to access the resources used in an attack. Therefore, the opportunities to attack and the damage that can be caused are strictly limited by the budget available to the attacker. A domain can control its exposure to attacks by setting the prices of critical resources and by limiting the currency that it makes available to potential attackers. Currency carries unique identifiers, enabling a domain to pinpoint the sources of attacks. Currency also provides a resource-independent instrumentation to monitor and correlate access patterns and to detect intrusion attacks through automated, uniform statistical analysis of anomalous currency flows. These mechanisms are resource-independent, and admit unlimited scalability for very large systems consisting of federated domains operated by mutually distrustful administrations. They uniquely establish quantifiable and adjustable limits on the power of attackers; enable verifiable accountability for malicious attacks; and admit systematic, uniform monitoring and detection of attacks.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Clearwater, S., editor. “Market-based Control of Distributed Systems,” World Scientific Press, 1996.
Dailianas, A., and Y. Yemini “A Protocol for Secure Financial Transactions,” Paper in Preparation.
Hull, J. C. “Options, Futures, and Other Derivatives,” third edition, Prentice Hall.
Kurose, J., M. Schwartz, and Y. Yemini “A Microeconomic Approach to Optimization of Channel Access Policies in Multiaccess Networks,” Proc. Of the 5th International Conference on Distributed Computer Systems, Denver, Colorado, 1995.
MacKie-Mason, J., and H. Varian “Economic FAQs About the Internet,” in The Journal of Economic Perspectives, vol. 8, no. 3, pp. 75–96, 1994. Reprinted (with revisions) in Internet Economics, J. Bailey and L. McKnight, eds. Cambridge, MIT Press, 1996.
MacKie-Mason, J., and H. Varian “Pricing the Internet,” in B. Kahin and J. Keller, editors, Public Access to the Internet, ACM, Boston, Massachusetts, May 1993.
Sairamesh, J., D. Ferguson, and Y. Yemini “An Approach to Pricing, Optimal Allocation and Quality of Service Provisioning in High-speed Packet Networks,” in Proc. of the Conference on Computer Communications, Boston, Massachusetts, April 1995.
Schneier, B. “Applied Cryptography,“ second edition, John Wiley &Sons, pp. 139–147.
Spafford, E. “The Internet Worm Incident,“ Technical Report CSD-TR-933, Department of Computer Sciences, Purdue University, Sept. 19, 1991.
Walsh, W., M. Wellman, P. Wurman, and J. MacKie-Mason “Some Economics of Market-Based Distributed Scheduling,” In Proc. of the 8th International Conference on Distributed Computing Systems (ICDCS-98), Amsterdam, the Netherlands, May 1998.
Yemini, Y. “Selfish Optimization in Computer Networks,” Proc. of the 20th IEEE Conference on Decision and Control, pp. 281–285, San Diego, CA., Dec. 1981.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yemini, Y., Dailianas, A., Florissi, D. (1998). MarketNet: Using Virtual Currency to Protect Information Systems. In: Nikolaou, C., Stephanidis, C. (eds) Research and Advanced Technology for Digital Libraries. ECDL 1998. Lecture Notes in Computer Science, vol 1513. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49653-X_88
Download citation
DOI: https://doi.org/10.1007/3-540-49653-X_88
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65101-7
Online ISBN: 978-3-540-49653-3
eBook Packages: Springer Book Archive