2nd International ICST Conference on Security and Privacy in Comunication Networks

Research Article

Denial of Service Attacks and Defenses in Decentralized Trust Management

  • @INPROCEEDINGS{10.1109/SECCOMW.2006.359545,
        author={Jiangtao  Li and Ninghui  Li and XiaoFeng Wang and Ting Yu},
        title={Denial of Service Attacks and Defenses in Decentralized Trust Management},
        proceedings={2nd International ICST Conference on Security and Privacy in Comunication Networks},
        publisher={IEEE},
        proceedings_a={SECURECOMM},
        year={2007},
        month={5},
        keywords={},
        doi={10.1109/SECCOMW.2006.359545}
    }
    
  • Jiangtao Li
    Ninghui Li
    XiaoFeng Wang
    Ting Yu
    Year: 2007
    Denial of Service Attacks and Defenses in Decentralized Trust Management
    SECURECOMM
    IEEE
    DOI: 10.1109/SECCOMW.2006.359545
Jiangtao Li1,*, Ninghui Li1,*, XiaoFeng Wang2,*, Ting Yu3,*
  • 1: Department of Computer Science, Purdue University
  • 2: School of Informatics, Indiana University.
  • 3: Department of Computer Science, North Carolina State University.
*Contact email: jtli@cs.purdue.edu, ninghui@cs.purdue.edu, xw7@indiana.edu, tyu@unity.ncsu.edu

Abstract

Trust management is an approach to scalable and flexible access control in decentralized systems. In trust management, a server often needs to evaluate a chain of credentials submitted by a client; this requires the server to perform multiple expensive digital signature verifications. In this paper, we study low-bandwidth denial-of-service (DoS) attacks that exploit the existence of trust management systems to deplete server resources. Although the threat of DoS attacks has been studied for some application-level protocols such as authentication protocols, we show that it is especially destructive for trust management systems. Exploiting the delegation feature in trust management languages, an attacker can forge a long credential chain to force a server to consume a large amount of computing resource. Using game theory as an analytic tool, we demonstrate that unprotected trust management servers will easily fall prey to a witty attacker who moves smartly. We report our empirical study of existing trust management systems, which manifests the gravity of this threat. We also propose a defense technique using credential caching, and show that it is effective in the presence of intelligent attackers