usenix conference policies
Towards Attack-Agnostic Defenses
Internet
attackers control hundreds of thousands to perhaps millions of
computers, which they can use for a variety of different attacks. Common
attacks include spam delivery, phishing, and DDoS. The current research
community focus is on defenses for each specific attack type
compromised hosts may launch. However, attack-specific approaches almost
always have two fundamental drawbacks: they do not address the root
problem that attackers control an army of compromised hosts, and they do
not provide the right incentives for users to properly secure their
machines. As a result, attack-specific defenses may be defeated by new
attacks, even those that may be only slightly different from old
attacks.
We argue researchers should also focus on attackagnostic
defenses whose effectiveness does not depend on the particular attack
type. We initiate this line of research by investigating the design
space for attack-agnostic defenses, and then detailing two extreme
points within the design space: an InternetWatch List and an Internet
Reputation System.
We argue researchers should also focus on attackagnostic defenses whose effectiveness does not depend on the particular attack type. We initiate this line of research by investigating the design space for attack-agnostic defenses, and then detailing two extreme points within the design space: an InternetWatch List and an Internet Reputation System.
author = {David Brumley and Dawn Song},
title = {Towards {Attack-Agnostic} Defenses },
booktitle = {First USENIX Workshop on Hot Topics in Security (HotSec 06)},
year = {2006},
address = {Vancouver, B.C. Canada},
url = {https://www.usenix.org/conference/hotsec-06/towards-attack-agnostic-defenses},
publisher = {USENIX Association},
month = jul
}
connect with us