input  by  which  reputee  reputations  are  diminished) 
contain  proofs  that  demonstrate  a  sender’s 
contribution to an attack. 
Non-participation  in  the DiDoS architecture  can 
be  an  attacker’s  attempt  at  evasion  to  escape 
repercussions  for  misbehaviour.  However,  since 
reputors (routers) are responsible for the traffic they 
forward  and,  as  a  result,  penalize  unauthenticated 
traffic, little advantage is gained by non-participation.  
Another attack avenue for evasion arises from the 
adaptation  mechanism  of  the  reputation  update 
algorithm,  in  which  the  reputation  attack-penalty  is 
reduced as the attack report rate increases (see section 
4.3).  An  attacker,  with  multiple  (reputee)  agents 
accountable  to  the  same  reputor,  may  attempt  to 
reduce  the  attack  penalty  meted  by  that  reputor  by 
initiating extremely large numbers of attacks to solicit 
similarly high numbers of feedback reports and thus 
cause the attack penalty to be reduced. Theoretically, 
if the attack reports are high enough by the attacker 
sacrificing  a  small  number  of  agents  that  are 
accountable  to  the  reputor  in  question,  then  the 
remaining  attacking  agents  could  end  up  attacking 
with impunity. However this attack is easily mitigated 
by capping the amount a single reputee can contribute 
to the total attack frequency number that is input to 
the reputation penalty calculations (Equation 3).  
The above attack can be described as evasion via 
collusive self-destruction, since an agent destroys its 
own reputation in order to execute the attack.  
Opportunities  for  sabotage,  where  an  attacker 
hampers  the  operational  ability  or  integrity  of  the 
system, are mitigated by various design features, such 
as  the distributed  nature of  the  architecture  and the 
cryptographic  protections  that  facilitate  packet 
forwarding  accounting.  For  example,  a  distributed 
DDoS defence helps to avoid a single point of failure, 
which, if attacked, could disrupt the entire system. 
The  practical adoption  of  DiDoS has  associated 
costs, such as time, equipment and human resources 
costs. The architecture, however, does offer adoption 
incentives,  the  value  of  which  grows  geometrically 
with  increasing  adoption –  via  the network  effect – 
since  an  organization  adopting  DiDoS  not  only 
benefits itself (via spoofing protection against DDoS 
attacks and increased prioritization of its packets over 
the internet), but also benefits other entities through 
1) the provision of attack feedback reports that help 
identify malicious actors, and 2) the granular marking 
of  its  sent  packets,  that  helps  other  entities  filter 
malicious traffic.   
 
4
  The number of times a reputee is involved in an attack in 
a given period of time.  
Another  consideration  of  the  architecture  is  the 
processing  overheads,  which  are  of  two  types:  in-
transit and background. In-transit processing occurs 
as  packets  traverse  the  Internet  and  contributes  to 
transit latency. The addition and in-transit verification 
of the message authentication codes that are added to 
packet  headers  to  facilitate  anti-spoofing  protection 
and  verifiable  attack  feedback,  are  examples  of  in-
transit processing.  
However,  it  is  important  to  highlight  that  such 
processing (described in section 4) is not required at 
every router in transit, but only at the boundaries of 
reputation  domains,  such  as  between  autonomous 
systems. Despite the presence of tens of thousands of  
autonomous systems  (ASs)  in  the Internet, research 
has shown that packets, on average, only traverse 3.9 
autonomous systems (AS’s) for IPv4 and 3.5 AS’s for 
IPv6  (Pappas  et  al.,  2015).  Additionally  prior  work 
has  demonstrated  the  feasibility  of  such  in-transit 
MAC processing (Liu et al., 2008). 
5.2  Use-case Experiment Setup 
An experiment to investigate the effectiveness of the 
reputation  convergence  of  the  DiDoS  architecture 
was  constructed  in  C++.  The  particular  use-case 
simulated was a local access network (LAN) in which 
multiple  devices  access  the  Internet  via  a  single 
access router – illustrated in figure 3.  
As  such,  each  access  device  is  considered  as  a 
reputee to the reputor access router. A proportion of 
said access devices were considered to be malicious 
and the rest benign. This disposition was reflected by 
the  differing  instance  values  of  the  (reputee-)  class 
attributes that determined the data rates that a reputee 
exhibited  during  attacks  and  its  attack  involvement 
frequency
4
 (AIF),  both  of  which  were  normally 
distributed  –  with  malicious  devices  generating 
greater in-attack data rates and higher frequencies of 
attack involvements. 
The simulation process worked by iteration over 
the set of reputees per specified period, to determine, 
from  the aforementioned  attributes of  each  reputee, 
the number  and  content of  reports passed  on  to the 
reputor  access  router.  The  number  of  attacks 
incidental in each iteration of the simulation, did not 
directly  correspond  to  the  number  of  attack  reports 
received  by  the  reputor  access  router,  but  each 
provisional  report  generated  was  passed  through  a 
function  incorporating  DiDoS  adoption  rate  as  a 
probability  of  whether  said  report  would  reach  the 
access router.