Abstract
In March of 2013, what started as a minor dispute between Spamhaus and Cyberbunker quickly escalated to a distributed denial of service (DDoS) attack that was so massive, it was claimed to have slowed internet speeds around the globe. The attack clogged servers with dummy internet traffic at a rate of about 300 gigabits per second. By comparison, the largest observed DDoS attacks typically against banks had thus far registered only 50 gigabits per second. The record breaking Spamhaus/Cyberbunker conflict arose 13 years after the publication of best practices on preventing DDoS attacks, and it was not an isolated event.
Recently, NYU’s Courant Institute and Carnegie Mellon Software Engineering Institute have collaboratively devised a game-theoretic approaches to address various cyber security problems involving exchange of information (asymmetrically). This research aims to discover and understand complex structures of malicious use cases within the context of secure systems with the goal of developing an incentives-based measurement system that ensures a high level of resilience to attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Beitollahi, H., Deconinck, G.: Review: Analyzing Well-known Countermeasures Against Distributed Denial of Service Attacks. Comput. Commun. 35(11), 1312–1332 (2012)
Bhatia, S., Schmidt, D., Mohay, G.: Ensemble-based DDoS Detection and Mitigation Model. In: Proceedings of the Fifth International Conference on Security of Information and Networks, SIN 2012, pp. 79–86. ACM, New York (2012)
Casey, W.: Deterrence for Malware: Towards a Deception-Free Internet (2013), http://blog.sei.cmu.edu/archives.cfm/author/will-casey+
Doron, E., Wool, A.: WDA: A Web Farm Distributed Denial of Service Attack Attenuator. Comput. Netw. 55(5), 1037–1051 (2011)
Fu, Z., Papatriantafilou, M., Tsigas, P.: CluB: A Cluster Based Framework for Mitigating Distributed Denial of Service Attacks. In: Proceedings of the ACM Symposium on Applied Computing, SAC, pp. 520–527. ACM, New York (2011)
Gallagher, S.: How Spamhaus’ Attackers Turned DNS into a Weapon of Mass Destruction. arstechnica.com (2013), http://arstechnica.com/information-technology/2013/03/how-spamhaus-attackers-turned-dns-into-a-weapon-of-mass-destruction/
Huang, Y., Geng, X., Whinston, A.B.: Defeating DDoS Attacks by Fixing the Incentive Chain. ACM Trans. Internet Technol. 7(1) (February 2007)
Kargl, F., Maier, J., Weber, M.: Protecting Web Servers from Distributed Denial of Service Attacks. In: Proceedings of the 10th International Conference on World Wide Web, WWW 2001, pp. 514–524. ACM, New York (2001)
Lee, K.-W., Chari, S., Shaikh, A., Sahu, S., Cheng, P.-C.: Improving the Resilience of Content Distribution Networks to Large Scale Distributed Denial of Service Attacks. Comput. Netw. 51(10), 2753–2770 (2007)
Lee, D.: Global Internet Slows after Biggest Attack in History. BBC news (2013), http://www.bbc.co.uk/news/technology-21954636
Mitre. Science of Cyber-security. JASON, MITRE Corporation (2010), https://www.fas.org/irp/agency/dod/jason/cyber.pdf
Saint-Andre, P.: Best Practices to Discourage Denial of Service Attacks. XSF XEP (2009), http://xmpp.org/extensions/xep-0205.html
Schwartz, M.J.: DDoS Spam Feud Backfires: Bulletproof Cyberbunker Busted. Informationweek.com (2013), https://www.informationweek.com+/security/attacks/ddos-spam-+feud-backfires-+bulletproof-cyb/240151895
Traulsen, A., Nowak, M.A.: Chromodynamics of Cooperation in Finite Populations. PLoS One 2(3), e270 (2007)
van Veelen, M., García, J., Rand, D.G., Nowak, M.A.: Direct Reciprocity in Structured Populations. Proceedings of the National Academy of Sciences 109(25), 9929–9934 (2012)
Walfish, M., Vutukuru, M., Balakrishnan, H., Karger, D., Shenker, S.: DDoS Defense by Offense. ACM Trans. Comput. Syst. 28(1), 3:1–3:54 (2010)
Williams, R.: DDoS Attack Against spamhaus Exposes Huge Security Threat on DNS Servers. hothardware.com (2013), http://hothardware.com/News/DDoS-Attack-Against-Spamhaus-Exposes-Huge-Security-Threat-On-DNS-Servers/
Xie, Y., Yu, S.-Z.: Monitoring the Application-layer DDoS Attacks for Popular Websites. IEEE/ACM Trans. Netw. 17(1), 15–25 (2009)
Yau, D.K.Y., Lui, J.C.S., Liang, F., Yam, Y.: Defending Against Distributed Denial-of-Service Attacks with Max-Min Fair Server-Centric Router Throttles. IEEE/ACM Trans. Netw. 13(1), 29–42 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Casey, W. et al. (2014). Cyber Security via Signaling Games: Toward a Science of Cyber Security. In: Natarajan, R. (eds) Distributed Computing and Internet Technology. ICDCIT 2014. Lecture Notes in Computer Science, vol 8337. Springer, Cham. https://doi.org/10.1007/978-3-319-04483-5_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-04483-5_4
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-04482-8
Online ISBN: 978-3-319-04483-5
eBook Packages: Computer ScienceComputer Science (R0)