The case for network witnesses

Network abuse is prevalent in todaypsilas Internet. To combat abuse, this paper examines a general approach for constructing network protocols based on the use of ldquonetwork witnessesrdquo: tamper-resistant, trusted third parties that reside at network protocol end-points. By providing authentic measurements of network use and by ensuring the correct usage of network protocols, we show how network witnesses can enable fundamentally new protocol designs that can protect networks against malicious use.