• DocumentCode
    2574671
  • Title

    Denial of Service Attacks and Defenses in Decentralized Trust Management

  • Author

    Li, Jiangtao ; Li, Ninghui ; Wang, XiaoFeng ; Yu, Ting

  • Author_Institution
    Dept. of Comput. Sci., Purdue Univ., West Lafayette, IN
  • fYear
    2006
  • fDate
    Aug. 28 2006-Sept. 1 2006
  • Firstpage
    1
  • Lastpage
    12
  • Abstract
    Trust management is an approach to scalable and flexible access control in decentralized systems. In trust management, a server often needs to evaluate a chain of credentials submitted by a client; this requires the server to perform multiple expensive digital signature verifications. In this paper, we study low-bandwidth denial-of-service (DoS) attacks that exploit the existence of trust management systems to deplete server resources. Although the threat of DoS attacks has been studied for some application-level protocols such as authentication protocols, we show that it is especially destructive for trust management systems. Exploiting the delegation feature in trust management languages, an attacker can forge a long credential chain to force a server to consume a large amount of computing resource. Using game theory as an analytic tool, we demonstrate that unprotected trust management servers will easily fall prey to a witty attacker who moves smartly. We report our empirical study of existing trust management systems, which manifests the gravity of this threat. We also propose a defense technique using credential caching, and show that it is effective in the presence of intelligent attackers
  • Keywords
    Internet; computer network management; game theory; protocols; security of data; telecommunication control; application-level protocols; authentication protocols; credential caching; decentralized systems; decentralized trust management; digital signature verifications; flexible access control; game theory; low-bandwidth denial of service attacks; scalable access control; Authentication; Bandwidth; Collaboration; Computer crime; Computer science; Game theory; Gravity; Protection; Protocols; Resource management;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Securecomm and Workshops, 2006
  • Conference_Location
    Baltimore, MD
  • Print_ISBN
    1-4244-0423-1
  • Electronic_ISBN
    1-4244-0423-1
  • Type

    conf

  • DOI
    10.1109/SECCOMW.2006.359545
  • Filename
    4198805