Skip to main content

MarketNet: Using Virtual Currency to Protect Information Systems

  • Conference paper
  • First Online:
  • 885 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1513))

Abstract

This paper describes novel market-based technologies for systematic, quantifiable and predictable protection of information systems against attacks. These technologies, incorporated in the MarketNet system, use currency to control access to information systems resources and to account for their use. Clients wishing to access a resource must pay in currency acceptable to the domain that owns it. An attacker must thus pay to access the resources used in an attack. Therefore, the opportunities to attack and the damage that can be caused are strictly limited by the budget available to the attacker. A domain can control its exposure to attacks by setting the prices of critical resources and by limiting the currency that it makes available to potential attackers. Currency carries unique identifiers, enabling a domain to pinpoint the sources of attacks. Currency also provides a resource-independent instrumentation to monitor and correlate access patterns and to detect intrusion attacks through automated, uniform statistical analysis of anomalous currency flows. These mechanisms are resource-independent, and admit unlimited scalability for very large systems consisting of federated domains operated by mutually distrustful administrations. They uniquely establish quantifiable and adjustable limits on the power of attackers; enable verifiable accountability for malicious attacks; and admit systematic, uniform monitoring and detection of attacks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Clearwater, S., editor. “Market-based Control of Distributed Systems,” World Scientific Press, 1996.

    Google Scholar 

  2. Dailianas, A., and Y. Yemini “A Protocol for Secure Financial Transactions,” Paper in Preparation.

    Google Scholar 

  3. Hull, J. C. “Options, Futures, and Other Derivatives,” third edition, Prentice Hall.

    Google Scholar 

  4. Kurose, J., M. Schwartz, and Y. Yemini “A Microeconomic Approach to Optimization of Channel Access Policies in Multiaccess Networks,” Proc. Of the 5th International Conference on Distributed Computer Systems, Denver, Colorado, 1995.

    Google Scholar 

  5. MacKie-Mason, J., and H. Varian “Economic FAQs About the Internet,” in The Journal of Economic Perspectives, vol. 8, no. 3, pp. 75–96, 1994. Reprinted (with revisions) in Internet Economics, J. Bailey and L. McKnight, eds. Cambridge, MIT Press, 1996.

    Article  Google Scholar 

  6. MacKie-Mason, J., and H. Varian “Pricing the Internet,” in B. Kahin and J. Keller, editors, Public Access to the Internet, ACM, Boston, Massachusetts, May 1993.

    Google Scholar 

  7. Sairamesh, J., D. Ferguson, and Y. Yemini “An Approach to Pricing, Optimal Allocation and Quality of Service Provisioning in High-speed Packet Networks,” in Proc. of the Conference on Computer Communications, Boston, Massachusetts, April 1995.

    Google Scholar 

  8. Schneier, B. “Applied Cryptography,“ second edition, John Wiley &Sons, pp. 139–147.

    Google Scholar 

  9. Spafford, E. “The Internet Worm Incident,“ Technical Report CSD-TR-933, Department of Computer Sciences, Purdue University, Sept. 19, 1991.

    Google Scholar 

  10. Walsh, W., M. Wellman, P. Wurman, and J. MacKie-Mason “Some Economics of Market-Based Distributed Scheduling,” In Proc. of the 8th International Conference on Distributed Computing Systems (ICDCS-98), Amsterdam, the Netherlands, May 1998.

    Google Scholar 

  11. Yemini, Y. “Selfish Optimization in Computer Networks,” Proc. of the 20th IEEE Conference on Decision and Control, pp. 281–285, San Diego, CA., Dec. 1981.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yemini, Y., Dailianas, A., Florissi, D. (1998). MarketNet: Using Virtual Currency to Protect Information Systems. In: Nikolaou, C., Stephanidis, C. (eds) Research and Advanced Technology for Digital Libraries. ECDL 1998. Lecture Notes in Computer Science, vol 1513. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49653-X_88

Download citation

  • DOI: https://doi.org/10.1007/3-540-49653-X_88

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65101-7

  • Online ISBN: 978-3-540-49653-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics