资源描述:
《a framework for mitigating attacks against measurement-based adaptation mechanisms in unstructured multicast overlay networks》由会员上传分享,免费在线阅读,更多相关内容在工程资料-天天文库。
1、1434IEEE/ACMTRANSACTIONSONNETWORKING,VOL.16,NO.6,DECEMBER2008AFrameworkforMitigatingAttacksAgainstMeasurement-BasedAdaptationMechanismsinUnstructuredMulticastOverlayNetworksAaronWalters,DavidZage,StudentMember,IEEE,andCristinaNitaRotaru,Member,IEEEAbstract—Manymulticastoverlaynetwo
2、rksmaintainappli-constraintsintheselectionoftheneighborsetandnoimposedcation-specificperformancegoalsbydynamicallyadaptingtheconstraintsintheresultingoverlay.Suchnetworksarereferredoverlaystructurewhenthemonitoredperformancebecomesinad-toasunstructuredoverlaynetworkstodifferentiatet
3、hemfromequate.Thisadaptationresultsinanunstructuredoverlaywherestructuredoverlaynetworks[1],wheretheoverlaytopologynoneighborselectionconstraintsareimposed.Althoughsuchofferspre-definedboundsandorganizationalinvariantsbynetworksprovideresiliencetobenignfailures,theyaresusceptibletoa
4、ttacksconductedbyadversariesthatcompromiseoverlayconstrainingthesetofnodeseligibletobecomeneighborsofnodes.Previousdefensesolutionsproposedtoaddressattacksagivennode.Examplesofmulticastsystemsusingstructuredagainstoverlaynetworksrelyonstrongorganizationalconstraintsoverlaynetworksi
5、ncludeScribe[2]andSplitStream[3];exam-andarenoteffectiveforunstructuredoverlays.Inthiswork,weplesofmulticastsystemsusingunstructuredoverlaysincludeidentify,demonstrateandmitigateinsiderattacksagainstmea-ESM[4],Nice[5],andOvercast[6].surement-basedadaptationmechanismsinunstructuredm
6、ulticastWhilepushingfunctionalitytoend-systemsallowsoverlayoverlaynetworks.Weproposetechniquestodecreasethenumberofincorrectadaptationsbyusingoutlierdetectionandlimitnetworkstoachievebetterscalability,italsomakesthemvul-theimpactofmaliciousnodesbyaggregatinglocalinformationnerablea
7、strustispushedtothefringesoftheInternetwheretoderiveglobalreputationforeachnode.Wedemonstratetheend-nodesaremorelikelytobecompromisedthancoreroutersattacksandmitigationtechniquesthroughreal-lifedeployments[7].Overlaynetworksaremoresusceptibletoinsiderattacksofamatureoverlaymulticas
8、tsystem.conductedbyattacke