首页> 外文会议>Research and advanced technology for digital libraries >MarketNet: Using Virtual Currency to Protect Information Systems
【24h】

MarketNet: Using Virtual Currency to Protect Information Systems

机译:MarketNet:使用虚拟货币保护信息系统

获取原文
获取原文并翻译 | 示例

摘要

This paper describes novel market-based technologies for systematic, quantifiable and predictable protection of information systems against attacks. These technologies, incorporated in the MarketNet system, use currency to control access to information systems resources and to account for their use. Clients wishing to access a resoruce must pay in currency acceptable to the domain that owns it. An attacker must thus pay to access the resources used in an attack. Therefore, the opportunities to attack and the damage that can be caused are strictly limited by the budget available to the attacker. A domain can control its exposure to attacks by seting the prices of critical resources and by limiting the currency that it makes available to potential attackers. Currnecy carries unique identifiers, enabling a domain to pinpoint the sources of attacks. Currency also provides a resoruce-independent instrumentation to monitor and correlate access patterns and to detect intrusion attacks throug hautomated, uniform statistical anlaysis of anomalous currency flows. These mechanisms are resrouce-independent, and admit unlimited scalability for very large systems consisting of federated domains operated by mutually distrustful administrations. They uniquely establish quantifiable and adjustable limits on the power of attackers; enable verifiable accountability for malicious attacks; and admit systematic, uniform monitoring and detection of attacks.
机译:本文介绍了基于市场的新颖技术,可对信息系统进行系统,可量化和可预测的保护,使其免受攻击。这些集成在MarketNet系统中的技术使用货币来控制对信息系统资源的访问并说明其使用情况。希望访问资源的客户必须以拥有它的域可接受的货币付款。因此,攻击者必须付费才能访问攻击中使用的资源。因此,攻击机会和可能造成的损害受到攻击者可用预算的严格限制。一个域可以通过设置关键资源的价格并限制其提供给潜在攻击者的货币来控制其受到攻击的可能性。 Currnecy带有唯一的标识符,从而使域可以查明攻击源。货币还提供了一种与资源无关的工具,以监视和关联访问模式,并通过自动,统一的统计分析异常货币流量来检测入侵攻击。这些机制与资源无关,并且对于由互不信任的管理机构运行的联合域组成的大型系统,允许无限的可伸缩性。它们独特地建立了对攻击者力量的可量化和可调整的限制;对恶意攻击启用可验证的责任制;并允许系统,统一地监视和检测攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号