The present invention relates to the field of internet communications; more particularly, the present invention relates to managing risks between users and providers using virtualization.
The Internet has become a fundamental part of life during the last decade and it has become of essential value to companies as well as to individual users to maintain stability of services that we rely upon on a daily basis. More than one billion people use the Internet and critical industries like the banking heavily rely on it. However, the Internet was built under assumptions that don't hold anymore: that all users of the network could be trusted and that the computers linked by the Internet were fixed objects. Hence, the Internet lacks inherent security architecture. Protections like firewalls and antispam software are add-ons and can be considered only as patches used until a real solution is found. The Internet has become just like the real world: both good and malicious individuals have access to it. However, unlike in the real world, it has become increasingly difficult to identify and trace the Internet users. As a consequence, malicious individuals have a strong incentive to shift their illegal activities to the Internet, where they can access more people in a shorter time period, while minimizing their chances of being discovered. As a result, the Internet's security problems are getting worse and at the same time society's dependence on the Internet's security is deepening.
One of the main problems of the current Internet is that the end users bear the complete cost of the attacks. ISPs or infected users do not carry any responsibility. None of the existing schemes that deal with DDoS attack prevention completely eliminates the risk. Even if one user protects itself from becoming a victim of an attack, this does not completely eliminate the risk due to the fact that each user needs to interact with numerous users with different security measures on a daily basis.
One of the most threatening attacks in the current Internet is the Distributed Denial-of-Service (DDoS) attack, which aggregates data traffic from several thousand computers and directs it to a victim web site, essentially causing the web site to be cut off from the world and stop functioning.
During the second stage, the master computers locate and infect vulnerable machines (i.e. computers without effective firewalls, or with newly discovered vulnerabilities, or unprotected machines) by installing flooding servers on them. This stage results in creation of an army of zombie computers 14, i.e. machines that can be controlled by the masters 13. The zombie machines belong to different networks (not shown) and connect to the Internet through various Internet Service Providers (ISPs not shown). During the final stage of the attack, better known as the flooding stage, master computers issue a command that activates zombie computers which flood the victim with a high volume of traffic. If successful, such an attack essentially blocks every path from the victim to the Internet.
Attackers can also hide the identity of infected machines by spoofing the source address field in packets sent by the infected machines. However, except in a few limited situations, such as reflector attacks, spoofing is not a mandatory part of DDoS attacks. It is used for delaying identification of infected machines and prolonging the effects of DDoS attacks.
By using reflectors, a master computer can achieve an effect that is significantly more powerful than if only address spoofing was used. In this case, a single master computer can flood the victim with traffic from more than one million sources.
The group of computers controlled by a single master computer is called a botnet (robot network, i.e. a network of “robot” computers controlled by a master computer). The main purpose of botnets is to use zombie computers for various fraudulent online activities. One significant problem when it comes to detection of botnets is that many owners of infected computers do not know that their machines have been compromised. Although botnets can be used for various types of illegal activities, in the present description, DDoS attacks that originate from botnets are emphasized.
The functionality of botnets would be significantly disrupted if (i) users paid more attention to their own security and (ii) businesses invested more into security and education of their own users. However, this is often not the case. Due to the current state of the Internet architecture, only the target of DDoS attacks bears the cost of the attack. Neither the infected users nor the ISPs bear any of the cost and therefore do not have any short term incentive to invest into security measures. However, this results in a paradox: it is widely accepted that defeating DDoS attacks will be beneficial to e-business given the huge loss these attacks incur; on the other hand, organizations are still reluctant to establish the defense given the costs and additional education they impose for their implementation.
Thus, managing security risks in the Internet has so far mostly involved methods to reduce the risks and the severity of the damages. Those methods (such as firewalls, intrusion detection and prevention, etc.) reduce but do not eliminate risk, and the question remains on how to handle the residual risk. Current schemes applied by Internet Service Providers (ISPs) penalize the users, who suffer from the consequences.
A method and apparatus is disclosed herein for compensating for and reducing security attacks on network entities. In one example, a virtual slice provider includes a secure and non-secure slice having resources to provide network access to users through a service provider. The secure slice is assigned a first security level and a non-secure slice is assigned a second lower security level. In one embodiment, the second slice is isolated from the first slice. The virtual slice provider also has a risk policy between the slice provider and the service provider to establish different rates charged to the service provider for access to the secure and non-secure slices and to provide different levels of payment to the service provider for losses resulting from a lack of security in each slice.
The present invention will be understood more fully from the detailed description given below and from the accompanying drawings of various embodiments of the invention, which, however, should not be taken to limit the invention to the specific embodiments, but are for explanation and understanding only.
A method and apparatus for compensating for and reducing security attacks on network entities are described. The techniques described herein transfer a portion of the risk to all the participants. The risk can be handled by re-arranging the economic incentives and transferring some part of the cost of attack to all involved parties, which is in contrast to the current system in which the attack target bears all the cost. According to embodiments of the present invention, such risks are managed by buying insurance against it and consequently re-arranging the incentive chain.
The description that follows is presented in the context of DDoS attacks against Internet users. The losses experienced by users can be significant for businesses that are denied use of sales, manufacturing, and marketing systems. However, there are a wide range of different security risks carried through the Internet and also through private networks. Internet risks can be transferred to private networks and risks can be originated on private networks to affect just that network or to be propagated to all connected networks including the Internet. Embodiments of the present invention can be applied to public and private networks and to a wide range of risks including viruses, spyware, Trojan horses and different types of bots. The variety of risks and their severity continuously change as technologies are developed. All of these risks and their resultant losses can be mitigated using the approaches described below.
In the following description, numerous details are set forth to provide a more thorough explanation of the present invention. It will be apparent, however, to one skilled in the art, that the present invention may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form, rather than in detail, in order to avoid obscuring the present invention.
Some portions of the detailed descriptions which follow are presented in terms of algorithms and symbolic representations of operations on data bits within a computer memory. These algorithmic descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is here, and generally, conceived to be a self-consistent sequence of steps leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the following discussion, it is appreciated that throughout the description, discussions utilizing terms such as “processing” or “computing” or “calculating” or “determining” or “displaying” or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.
The present invention also relates to apparatus for performing the operations herein. This apparatus may be specially constructed for the required purposes, or it may comprise a general purpose computer selectively activated or reconfigured by a computer program stored in the computer. Such a computer program may be stored in a computer readable storage medium, such as, but is not limited to, any type of disk including floppy disks, optical disks, CD-ROMs, and magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs), EPROMs, EEPROMs, magnetic or optical cards, or any type of media suitable for storing electronic instructions, and each coupled to a computer system bus.
The algorithms and displays presented herein are not inherently related to any particular computer or other apparatus. Various general purpose systems may be used with programs in accordance with the teachings herein, or it may prove convenient to construct more specialized apparatus to perform the required method steps. The required structure for a variety of these systems will appear from the description below. In addition, the present invention is not described with reference to any particular programming language. It will be appreciated that a variety of programming languages may be used to implement the teachings of the invention as described herein.
A machine-readable medium includes any mechanism for storing or transmitting information in a form readable by a machine (e.g., a computer). For example, a machine-readable medium includes read only memory (“ROM”); random access memory (“RAM”); magnetic disk storage media; optical storage media; flash memory devices; etc.
For purposes herein, two types of entities exist, namely ISPs and users, where their goal is to maximize their gain while minimizing their losses. It is assumed that the users are aware of the risks involved when they interact with other users and would like to insure themselves and minimize their own losses. On the other hand, the main goal of ISPs is to avoid losses due to attacks and have their insurance costs covered by premiums from users, while earning a profit for their shareholders. A framework is described herein that uses insurance mechanisms that bring profit to the ISPs while protecting the users from risks. In this framework, the ISPs offer certain types of insurance to the users in exchange for certain levels of insurance premiums. Two types of users are assumed: high risk users and low risk users, where the terms “high” and “low” define the probability that a certain user will seek a payment from the insurer. More specifically, a high risk user is more likely to ask for an insurance claim payout than low risk user. In other words, the high risk user is more likely to experience a loss against the policy and make a claim for compensation or indemnity based on that loss. However, more types of users may be used, depending on the particular circumstances.
Each user is assumed to have a wealth was a result of his Internet connectivity and activity. When this wealth is not insured, there exist two possible outcomes for the user. If the user doesn't suffer any damage, the user's wealth will still remain equal to w and the user's utility will be U(w). On the other hand, if the user does suffer damage, the user's wealth will be reduced to w−d and the user's utility will be U(w−d). In one embodiment, the user's expected wealth, E(w) is determined based on the probability p of damage occurring and is given by:
E(w)=p(w−d)+(1−p)w
and the user's expected utility is given by:
EU(N)=pU(w−d)+(1−p)U(w),
where N in U(N) stands for utility when no insurance is offered.
Now consider the case with insurance offered, where an individual purchases an insurance premium at price α1. Hence, the initial wealth of a user is equal to w−α1. In the case of an attack, the ISP acting as an insurer pays out an amount of money equal to α2 and consequently the resulting wealth of an insured individual after the accident is equal to w−α1−d+α2. The user's expected utility in this case can be expressed as:
EU(I)=pU(w−β)+(1−p)U(w−a1),
where β=α1+d−α2 and I in U(I) stands for utility when insurance is offered. The payout insurance premium α2 can be a function of both the insurance premium a1 and the probability p that individual users will make an insurance claim. The vector a α=(α1, α2) defines an insurance contract between the ISP as an insurer and the user.
Furthermore, the following notation is used for purposes herein:
pU(w−β)+(1−p)U(w−α1)>pU(w−d)+(1−p)U(w)
In one embodiment, the ISPs do not implement any kind of outbound traffic control and the only type of traffic control implemented is the standard inbound traffic control. As explained below, the techniques described herein provide benefits regardless of the types of traffic control implemented by ISPs and other participants in the network. The insurance architecture described below provides an incentive for both ISPs and users to increase the security of the network.
For purposes herein, the following definitions are used. However, the specific parameters of any system may be adapted to suit the particular circumstances:
As mentioned above, a user cannot eliminate the risk by only protecting himself partially due to the fact that new threats, for example a new OS vulnerability, appear and propagate with high speed, and partially due to the fact that both ISPs and users interact with each other and thus they are highly dependent on each other's conditions. Even though significant resources are being invested into security, the Internet users and services are still extremely vulnerable
For simplicity, in one embodiment, only two types of users are considered in this architecture: high and low risk, however many more types may be considered. The user is classified as either low or high risk depending on one or more factors. In one embodiment, these factors include one or more of the following: profitability of its business (more successful businesses are more likely to be a target), publicity of the user (better known and more controversial users are more likely to be a target), whether or not the user deals with sensitive and important data etc. In that light, each user is classified as either high or low risk. More specifically, for purposes of this example, the two types of users can be defined as follows:
By introducing insurance, part of the risk is transferred to the ISP. In the case of a DDoS or other attack, the ISP compensates for the damages of users who pay insurance. As to ISP profit, each of the insurance policy examples attracts certain portions of low and high risk customers. The architecture described herein includes a policy that: (i) is acceptable for users (brings satisfying level of compensation for an acceptable insurance premium) and ISPs (brings them profit); (ii) can survive in the competitive market (i.e. is stable).
In networks, there are two possible scenarios:
1) lSPs cannot identify high and low risk users and all risk types are offered the same policy.
2) ISPs can identify both classes of users and offer different policies to each type.
In addition to the above, assume that all users know their own risk type Pi, but this information is not available to the companies, such as ISPs and insurance carriers. This setup is more realistic because users in general know more about their risk type than the insurance companies. This claim is true even in the case of uneducated users. Namely, even though they do not know how insecure they are, they are aware that they are not using any security measures to protect themselves from becoming a victim.
In this scenario, both high and low risk users are offered the same policy due to the ignorance of ISP which is not capable of pinpointing different types of users. This scenario exists in the case when the insurance agent is ignorant about the user's risk types and consequently chooses to offer the same policy for all the users. This scenario is the basis for the diagram of
Considering
Both types of users have the same preferences, but their indifference curves have different slopes at any point in the state space diagram since they face different probabilities of presenting claims against the insurance premiums. The line MRSL in
Looking at what the market average fair premium represents, the insurer will be driven by market demand to offer the policy that optimizes the welfare of the low risk customers. This policy is represented with point A in
No contract like the one illustrated in
Point B in
Consequently, equilibrium does not exist in the setup suggested by
Summing up
The situation in which all the users are offered the same policy can become infeasible as soon as an informed insurer enters the market, resulting in a strict separation of low and high risk users. If one or more ISPs decide on a policy where they offer fixed insurance premiums for all users, they eventually attract primarily the high risk users. In the scenario illustrated in
The point labeled B on the MRSL line represents the point where the utility curve from the high risk group seeking full insurance crosses the MRSL, the marginal rate of substitution curve from the low risk group B is the best policy that can be offered to low risk users that would not also attract high risk users because it is on the high risk user indifference curve U(H). If an ISP offered another policy, say B+, low risk users would strictly prefer it. However, the high risk users would also prefer this policy, resulting in a single policy scenario, the non-sustainable or non-equilibrium scenario above. If an ISP offered a policy B−, high risk users would not select it, but low risk users would strictly prefer the original policy at B. Hence, any policy like B− is dominated by B. So, B is the point that defines the separating constraint for low and high risk users. Any policy that is more attractive to high risk users would converge to the single policy scenario suggested by
In the scenario, the market fair odds line, M1, lies below the low risk customer's indifference curve U(L) through C. In this case, any contract capable of attracting low risk users away from C would also attract high risk users from A and lie above the market average fair odds line, MRSH, thus introducing a premium below the market average fair odds premium and producing expected losses for the insurer. An insurer (ISP) faced with competitors offering the separating contracts could do no better than to offer those contracts itself and can find no other contract to offer which produces supernormal profits; the separating contract therefore represents Nash equilibrium.
The contract located at point D is the same one as the one analyzed in
As demonstrated using the diagrams above, there is no obvious guarantee for the service provider that his insurance business plan will be successful. The internet architectures discussed above do not provide any incentive for the ISPs to protect their users from attacks, i.e. offer them some kind of compensation. If the main goal of ISPs is to make profit and the main goal of users is to be protected from attacks (maintain the majority of their wealth even in the case of attacks), then an insurance scenario, where part of the risk was transferred to the ISPs would seem reasonable. However, as explained above, by using only insurance, ISPs have no guarantee to make a profit and consequently have no incentive to implement schemes using simple insurance scenarios. Accordingly, ISPs in order to profit from insurance will converge toward more secure schemes, in which they transfer their residual risk to a third party.
As explained above, neither insurance scheme offers strong security guarantees to users that purchase the policy, while remaining profitable for the ISP at all times. In addition, the introduction of competition in the market (i.e. several ISPs competing for customers and offering different types of insurance) leads to a natural separation of high and low risk users. A stricter framework for regulating user behavior can be obtained by introducing virtualization. Virtualization introduces a new entity referred to herein as a VSP (Virtual Slice Provider). The VSPs interact with ISPs in new insurance scenarios.
The VSP provides access to virtual slices. These slices include data centers, routers, switches, and any other network access resources. In one embodiment, each slice is configured to include some measure of guaranteed access to slice resources, such as memory, CPU time, link speed, etc. For each slice, these resources can be dedicated and isolated so that risks from one slice do not directly affect risks from other sources. In one embodiment, a VSP subjects different slices to different security levels.
In a completely virtualized network, all devices and links are divided into virtual slices. Such a network can be public or private or mixed. In one embodiment, for a non-distributed approach, slices are assigned, usually in response to a user request that is directed to a control node (CN) managed by an ISP.
The different slices allow ISPs to separate different types of users by using different slices for users of different risk types. The different slices also allow the ISP to be charged different insurance premiums depending on the risk that its users present and the security level of a slice. The ISP, in order to minimize its insurance premiums can then observe the behavior of its users and for high risk users increase the insurance premiums or terminate access. As a result, the insurance premium imposed on a user by an ISP tends to be a function of the estimated risk level of the user pool that the ISP attracts.
The VSP in the same way classifies ISPs based on risk level and adjust insurance premiums based on the risk level. The VSP can then terminate access to secure slice to a particular ISP if it estimates that a particular ISP brings too much risk.
As explained above, an equilibrium exists only when an ISP's policy attracts both low and high risk users. If the population is mostly low risk, the offered equilibrium is profitable and the policy will be offered. Here, an alternative version of this scenario, where an ISP offers a policy that attracts mostly low risk users, but has a certain portion of high risk users is more fully described.
The nature of the Internet typically involves continuous interactions between multiple users that belong to multiple ISPs. Therefore, in some models two conditions are met:
1) The ISP needs to be held partly accountable for the behavior of its users
2) Each VSP needs to know the risk level of the ISPs it is interacting with. Given that information, it classifies ISPs as high or low risk and charges appropriate insurance premiums.
For the system model in accordance with some embodiments of the present invention, the following entities are contemplated, however more or fewer and different entities may be considered depending on the circumstances:
From the point of view of DDoS attacks, highly secure users are users that invest into their own security measures and are knowledgeable about possible dangers involved in internet activities. Hence, this class of users is less likely to become infected and consequently become a part of a botnet. On the other hand, non-secure users are either not knowledgeable and are unable to protect themselves from dangers or are not interested in investing into their own security.
High risk services can be characterized as more likely to be a target of DDoS attacks than low risk services. Consequently, high risk services need more protection. It is assumed that the VSP has the right to terminate access to secure slices in case it estimates that the ISP brings too much risk to other users and services that have access to the secure slice. In addition, for this model, ISPs monitor inbound traffic; however, this is not required. In one embodiment, to minimize the probability of originating an attack, the ISPs that are granted access to a secure slice have an obligation to monitor outbound traffic as well. Otherwise, if no such control was implemented and the attack happens, the VSP will have an incentive to deny further access to the secure slice to the ISP that was the originator of the attack. In addition to that, the VSP would have to pay out insurance premiums to all its users and services due to the fact that they lost connectivity. Hence, there is enough motivation for mandatory implementation of outbound traffic control for accessing the secure slice.
In one embodiment, an ISP that performs both inbound and outbound traffic control is granted access to a secure slice. Otherwise, if only inbound traffic control is performed, an ISP is granted access to a regular slice only. An ISP that accesses a secure slice needs to offer low risk insurance policies to its users, and only users that pay for insurance are allowed on the secure slice. High risk slices can accommodate both users that do not buy insurance (and may also not self-protect) and users who choose to transfer their residual risk and buy high risk insurance, but there is no requirement on ISPs to offer insurance for access to a high risk slice, just as in today's Internet. In addition, ISPs must enforce additional protections on the low risk slice, such as restrictions on access to users whose self-protection measures are up to date and are not infected, and outbound traffic control to ensure that they do not originate any attack traffic.
Accordingly, it is in the interest of ISPs in this scenario to implement strict outbound traffic control for accessing the secure slice. In case the ISP observes abnormal behavior of a certain user, it will either increase its insurance premium or completely terminate its access (to reduce the probability of becoming a source of an attack and being denied access to the secure slice 22 by the VSP 21). Thus, the architecture described herein provides incentive to users to take certain security measures and incentive to the ISPs to perform a tighter control of user's activities.
Embodiments of the present invention can be considered in the context of the following general insurance model. The insurance premium imposed on ISPi (the ith ISP) is a function of the estimated risk level of the user pool ISPi attracts. The proposed virtualization architecture removes the problem of asymmetric information (i.e. that the ISP doesn't know the users' self protection levels while the other users do) that arises in the previous setting, where no virtualization architecture is implemented. In the previous setting. The ISPs determine the premiums according to average risk and are not able to classify users prior to selling insurance premiums. In the virtualized setting, VSPs observe the behavior of a candidate ISP, its interactions with other ISPs as well as actions of its users and after a predetermined period of time they assess the risk of a given ISP (i.e. the probability p) and offer a corresponding insurance premium. Therefore, it is in the interest of an ISP to enforce strict user enrolment policies and control of outbound traffic. In this way, each ISP monitors the behavior of its users and determines whether the user is secure or non-secure and determines the insurance premium for that specific user. If a user is determined to be secure, but later changes its behavior, the ISP will change the user's classification into non-secure and charge a higher premium. On the other hand, the ISP determines the risk factor of each service it hosts and charges adequate insurance.
High risk services will want to access secure slices in order to minimize the risk. Note that the control of the outbound traffic helps the efficient functioning of an ISP. Therefore, depending on (i) behavior of its users, and (ii) the number of high and low risk services, each ISP is assigned a certain risk level by the VSP. The VSP then estimates the risk and offers a certain insurance premium to the ISP. Thus, the complete cost to the ISP in this case can be represented as:
C
ISP=Insurance premium(RISP)+CA+CO,
where RISP represents the estimated risk of an ISP, CA represents the slice access cost and CO represents the management cost of outbound traffic and other security measures. On the other hand, the VSP needs to impose an insurance policy that will compensate for (i) the cost of a potential DDoS attack and (ii) the slice management costs.
The first item, the cost of potential DDoS attack, carries the most risk. VSPs have an incentive to apply strict user enrolment policies. ISPs also have an incentive to access slices of higher security.
As a result, the cost imposed to each VSP can be expressed as follows:
where D(i) represents the cost of a DDoS attack originating from ISPi and CM represents the management cost of virtual slices. On the other hand, the gain of the VSP can be defined as
where the first item in the equation represents the sum of all insurance premiums (a function of estimated risk) paid by all ISPs that access a certain slice and the second item represents the sum of all slice access charges collected from all ISPs.
This scheme combines virtualization and insurance mechanisms for managing the risks involved in the current Internet. Such a model may also be applied to any other type of risky network. By introducing virtualization a strict control of user behavior can be imposed and incentives are provided for users to take certain security measures when accessing the Internet. The information asymmetry is removed in ISP-VSP interactions, enabling successful management of residual risk imposed by the inability of ISPs to assess the risk of their customers. The high risk slice provides an opportunity for ISPs and their users to offer exactly the same service with exactly the same lack of security guarantees for customers that don't want to pay a premium for more secure service. The proposed architecture provides stringent security guarantees (which include connectivity) for all users that are granted access to secure slices. As a consequence: (i) users now have incentive to invest into their own security (this will result in decreased insurance premiums) and (ii) all the ISPs have the incentive to control the behavior of their users (this will result in larger profit since ISPs will suffer low or no losses from low-security users and will charge premiums for accessing highly secured slices).
Embodiments of the present invention provide an economically viable insurance market solution that can separate different types of users over a virtualized network. The virtualized network described above with multiple slices is used to separate users of different risk types. Different self-investment incentives and insurance policies further reduce and manage the residual risk. This architecture applies economic principles to decrease the risk of DDoS and other types of attacks while providing incentives for good behavior.
The virtualized network as presented in the present description presents an effective way to estimate risk. The virtualization architecture ensures better risk evaluations and better (more realistic) insurance premiums offerings. The multiple slices allow users of different risk types to be separated. In one example, an insurance business model can survive because users that access the secure network remove information asymmetry. This results in lower insurance premiums because the risk can be estimated correctly, offering higher security to users.
The virtualization architecture can be further enhanced by offering different self-investment incentives and insurance policies to further reduce and manage the residual risk. The overall system may have no impact on users that do not have strict security requirements. These users can continue operating as before (with the same risks as before).
On the other hand, high risk users with strict security requirements can be offered incentives to adopt good security practices such as lower insurance premiums and damage compensation in case of attack.
In the virtualized network described above, there is a variety of different possible configuration. A VSP can lease separate and isolated network slices to ISPs. In this setting, each network slice can be configured with different inbound and outbound traffic monitoring, user monitoring, and security properties. Each slice can also be accompanied by a different insurance policy. ISPs can lease one or more slices based on their own customer profiles. Network access providers (or Slice Managers) grant different access privileges and insurance policies to individual ISPs based on their conformance to the slice security and the risk they bear for the slice. Using virtualization more strict user control can be imposed because ISPs now know the risk of other users. In addition, some of the cost of potential distributed denial of service attacks is distributed to the ISPs, who are now incentivized to impose additional traffic control, user control, monitoring, and tracing.
Embodiments of the invention provide a novel, incentive based, method for prevention of attacks and mitigation of the effects of DDoS attacks. This can be used together with traffic filtering and other already existing attack prevention methods.
System 700 further comprises a random access memory (RAM), or other dynamic storage device 704 (referred to as main memory) coupled to bus 711 for storing information and instructions to be executed by processor 712. Main memory 704 also may be used for storing temporary variables or other intermediate information during execution of instructions by processor 712.
Computer system 700 also comprises a read only memory (ROM) and/or other static storage device 706 coupled to bus 711 for storing static information and instructions for processor 712, and a data storage device 707, such as a magnetic disk or optical disk and its corresponding disk drive. Data storage device 707 is coupled to bus 711 for storing information and instructions.
Computer system 700 may further be coupled to a display device 721, such as a cathode ray tube (CRT) or liquid crystal display (LCD), coupled to bus 711 for displaying information to a computer user. An alphanumeric input device 722, including alphanumeric and other keys, may also be coupled to bus 711 for communicating information and command selections to processor 712. An additional user input device is cursor control 723, such as a mouse, trackball, trackpad, stylus, or cursor direction keys, coupled to bus 711 for communicating direction information and command selections to processor 712, and for controlling cursor movement on display 721.
Another device that may be coupled to bus 711 is hard copy device 724, which may be used for marking information on a medium such as paper, film, or similar types of media. Another device that may be coupled to bus 711 is a wired/wireless communication capability 725 to communication to a phone or handheld palm device.
Note that any or all of the components of system 700 and associated hardware may be used in the present invention. However, it can be appreciated that other configurations of the computer system may include some or all of the devices.
Whereas many alterations and modifications of the present invention will no doubt become apparent to a person of ordinary skill in the art after having read the foregoing description, it is to be understood that any particular embodiment shown and described by way of illustration is in no way intended to be considered limiting. Therefore, references to details of various embodiments are not intended to limit the scope of the claims.
The present patent application claims priority to and incorporates by reference the corresponding provisional patent application Ser. No. 61/028,502, titled, “A Method and Apparatus for Recovering from and Preventing Security Attacks on Network Entities,” filed on Feb. 13, 2008.
Number | Date | Country | |
---|---|---|---|
61028502 | Feb 2008 | US |