Deutsch
 
Hilfe Datenschutzhinweis Impressum
  DetailsucheBrowse

Datensatz

DATENSATZ AKTIONENEXPORT
  Eclipse Attacks on Overlay Networks: Threats and Defenses

Singh, A., Ngan, T.-W.-"., Druschel, P., & Wallach, D. S. (2006). Eclipse Attacks on Overlay Networks: Threats and Defenses. In 25th IEEE International Conference on Computer Communications (INFOCOM 2006). Barcelona, Spain: IEEE.

Item is

Dateien

einblenden: Dateien
ausblenden: Dateien
:
Eclipse-Infocom.pdf (beliebiger Volltext), 192KB
 
Datei-Permalink:
-
Name:
Eclipse-Infocom.pdf
Beschreibung:
-
OA-Status:
Sichtbarkeit:
Privat
MIME-Typ / Prüfsumme:
application/pdf
Technische Metadaten:
Copyright Datum:
-
Copyright Info:
eDoc_access: PUBLIC
Lizenz:
-

Externe Referenzen

einblenden:

Urheber

einblenden:
ausblenden:
 Urheber:
Singh, Atul1, Autor           
Ngan, Tsuen-Wan "Johnny", Autor
Druschel, Peter1, Autor           
Wallach, Dan S., Autor
Affiliations:
1Group P. Druschel, Max Planck Institute for Software Systems, Max Planck Society, ou_2105287              

Inhalt

einblenden:
ausblenden:
Schlagwörter: -
 Zusammenfassung: Overlay networks are widely used to deploy functionality at edge nodes without changing network routers. Each node in an overlay network maintains connections with a number of peers, forming a graph upon which a distributed application or service is implemented. In an “Eclipse” attack, a set of malicious, colluding overlay nodes arranges for a correct node to peer only with members of the coalition. If successful, the attacker can mediate most or all communication to and from the victim. Furthermore, by supplying biased neighbor information during normal overlay maintenance, a modest number of malicious nodes can eclipse a large number of correct victim nodes. This paper studies the impact of Eclipse attacks on structured overlays and shows the limitations of known defenses. We then present the design, implementation, and evaluation of a new defense, in which nodes anonymously audit each other’s connectivity. The key observation is that a node that mounts an Eclipse attack must have a higher than average node degree. We show that enforcing a node degree limit by auditing is an effective defense against Eclipse attacks. Furthermore, unlike most existing defenses, our defense leaves flexibility in the selection of neighboring nodes, thus permitting important overlay optimizations like proximity neighbor selection (PNS).

Details

einblenden:
ausblenden:
Sprache(n): eng - English
 Datum: 2007-04-132006
 Publikationsstatus: Erschienen
 Seiten: -
 Ort, Verlag, Ausgabe: -
 Inhaltsverzeichnis: -
 Art der Begutachtung: -
 Identifikatoren: eDoc: 314349
Anderer: C125718C00511B58-DD188957C93C7BFAC12572BC0055107A-singh-2006-eclipse
 Art des Abschluß: -

Veranstaltung

einblenden:

Entscheidung

einblenden:

Projektinformation

einblenden:

Quelle 1

einblenden:
ausblenden:
Titel: 25th IEEE International Conference on Computer Communications (INFOCOM 2006)
Genre der Quelle: Konferenzband
 Urheber:
Affiliations:
Ort, Verlag, Ausgabe: Barcelona, Spain : IEEE
Seiten: - Band / Heft: - Artikelnummer: - Start- / Endseite: - Identifikator: -