input by which reputee reputations are diminished)
contain proofs that demonstrate a sender’s
contribution to an attack.
Non-participation in the DiDoS architecture can
be an attacker’s attempt at evasion to escape
repercussions for misbehaviour. However, since
reputors (routers) are responsible for the traffic they
forward and, as a result, penalize unauthenticated
traffic, little advantage is gained by non-participation.
Another attack avenue for evasion arises from the
adaptation mechanism of the reputation update
algorithm, in which the reputation attack-penalty is
reduced as the attack report rate increases (see section
4.3). An attacker, with multiple (reputee) agents
accountable to the same reputor, may attempt to
reduce the attack penalty meted by that reputor by
initiating extremely large numbers of attacks to solicit
similarly high numbers of feedback reports and thus
cause the attack penalty to be reduced. Theoretically,
if the attack reports are high enough by the attacker
sacrificing a small number of agents that are
accountable to the reputor in question, then the
remaining attacking agents could end up attacking
with impunity. However this attack is easily mitigated
by capping the amount a single reputee can contribute
to the total attack frequency number that is input to
the reputation penalty calculations (Equation 3).
The above attack can be described as evasion via
collusive self-destruction, since an agent destroys its
own reputation in order to execute the attack.
Opportunities for sabotage, where an attacker
hampers the operational ability or integrity of the
system, are mitigated by various design features, such
as the distributed nature of the architecture and the
cryptographic protections that facilitate packet
forwarding accounting. For example, a distributed
DDoS defence helps to avoid a single point of failure,
which, if attacked, could disrupt the entire system.
The practical adoption of DiDoS has associated
costs, such as time, equipment and human resources
costs. The architecture, however, does offer adoption
incentives, the value of which grows geometrically
with increasing adoption – via the network effect –
since an organization adopting DiDoS not only
benefits itself (via spoofing protection against DDoS
attacks and increased prioritization of its packets over
the internet), but also benefits other entities through
1) the provision of attack feedback reports that help
identify malicious actors, and 2) the granular marking
of its sent packets, that helps other entities filter
malicious traffic.
4
The number of times a reputee is involved in an attack in
a given period of time.
Another consideration of the architecture is the
processing overheads, which are of two types: in-
transit and background. In-transit processing occurs
as packets traverse the Internet and contributes to
transit latency. The addition and in-transit verification
of the message authentication codes that are added to
packet headers to facilitate anti-spoofing protection
and verifiable attack feedback, are examples of in-
transit processing.
However, it is important to highlight that such
processing (described in section 4) is not required at
every router in transit, but only at the boundaries of
reputation domains, such as between autonomous
systems. Despite the presence of tens of thousands of
autonomous systems (ASs) in the Internet, research
has shown that packets, on average, only traverse 3.9
autonomous systems (AS’s) for IPv4 and 3.5 AS’s for
IPv6 (Pappas et al., 2015). Additionally prior work
has demonstrated the feasibility of such in-transit
MAC processing (Liu et al., 2008).
5.2 Use-case Experiment Setup
An experiment to investigate the effectiveness of the
reputation convergence of the DiDoS architecture
was constructed in C++. The particular use-case
simulated was a local access network (LAN) in which
multiple devices access the Internet via a single
access router – illustrated in figure 3.
As such, each access device is considered as a
reputee to the reputor access router. A proportion of
said access devices were considered to be malicious
and the rest benign. This disposition was reflected by
the differing instance values of the (reputee-) class
attributes that determined the data rates that a reputee
exhibited during attacks and its attack involvement
frequency
4
(AIF), both of which were normally
distributed – with malicious devices generating
greater in-attack data rates and higher frequencies of
attack involvements.
The simulation process worked by iteration over
the set of reputees per specified period, to determine,
from the aforementioned attributes of each reputee,
the number and content of reports passed on to the
reputor access router. The number of attacks
incidental in each iteration of the simulation, did not
directly correspond to the number of attack reports
received by the reputor access router, but each
provisional report generated was passed through a
function incorporating DiDoS adoption rate as a
probability of whether said report would reach the
access router.