REMOTEGATE: Incentive-Compatible Remote Configuration of Security Gateways

09/14/2017
by   Abhinav Aggarwal, et al.
0

Imagine that a malicious hacker is trying to attack a server over the Internet and the server wants to block the attack packets as close to their point of origin as possible. However, the security gateway ahead of the source of attack is untrusted. How can the server block the attack packets through this gateway? In this paper, we introduce REMOTEGATE, a trustworthy mechanism for allowing any party (server) on the Internet to configure a security gateway owned by a second party, at a certain agreed upon reward that the former pays to the latter for its service. We take an interactive incentive-compatible approach, for the case when both the server and the gateway are rational, to devise a protocol that will allow the server to help the security gateway generate and deploy a policy rule that filters the attack packets before they reach the server. The server will reward the gateway only when the latter can successfully verify that it has generated and deployed the correct rule for the issue. This mechanism will enable an Internet-scale approach to improving security and privacy, backed by digital payment incentives.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/19/2023

Protecting IoT Servers Against Flood Attacks with the Quasi Deterministic Transmission Policy

IoT Servers that receive and process packets from IoT devices should mee...
research
04/14/2021

Preventing Manipulation Attack in Local Differential Privacy using Verifiable Randomization Mechanism

Local differential privacy (LDP) has been received increasing attention ...
research
11/16/2021

Remote Memory-Deduplication Attacks

Memory utilization can be reduced by merging identical memory blocks int...
research
07/06/2009

Design of an Optimal Bayesian Incentive Compatible Broadcast Protocol for Ad hoc Networks with Rational Nodes

Nodes in an ad hoc wireless network incur certain costs for forwarding p...
research
03/23/2023

BlockFW – Towards Blockchain-based Rule-Sharing Firewall

Central-managed security mechanisms are often utilized in many organizat...
research
09/04/2019

Internet Appendix for "Sequential Bargaining Based Incentive Mechanism for Collaborative Internet Access"

This document is an Internet Appendix of paper entitled "Sequential Barg...
research
04/12/2019

QFactory: classically-instructed remote secret qubits preparation

The functionality of classically-instructed remotely prepared random sec...

Please sign up or login with your details

Forgot password? Click here to reset