DEFENSES
In this section we examine potential defenses against puppetnets. The goal is
to determine whether it is feasible to address the threat by tackling the source
of the problem, rather than relying on techniques that attempt to mitigate the
resulting attacks, such as DDoS, which may be hard to implement right at a
global scale.
We discuss various defense strategies and the tradeoffs they offer. We concentrate
on defenses against DDoS, scanning and worm propagation. Detecting
malicious computations seems hard, and well beyond the scope of this
article. Cookie-authenticated services seem trivial to protect by adding noncookie
session state that is communicated to the browser when the user wishes
to re-authenticate