TY - GEN
T1 - Message dropping attacks in overlay networks
T2 - 2006 Securecomm and Workshops
AU - Xie, Liang
AU - Zhu, Sencun
PY - 2006
Y1 - 2006
N2 - Overlay multicast networks are used by service providers to distribute contents such as web pages, streaming multimedia data, or security updates to a large number of users. However, such networks are extremely vulnerable to message dropping attacks by malicious or selfish nodes that intentionally drop packets they are required to forward. It is difficult to detect such attacks both efficiently and effectively, not mentioning to further identify the attackers, especially when members in the overlay switch between online/offline statuses frequently. We propose a random-sampling-based scheme to detect such attacks, and a path-resolving-based scheme to identify the attack nodes. Our schemes work for dynamic overlay networks and do not assume the global knowledge of the overlay hierarchy. Analysis and simulation results show that our schemes are bandwidthefficient and they both have high detection/identification rates but low false positive rates.
AB - Overlay multicast networks are used by service providers to distribute contents such as web pages, streaming multimedia data, or security updates to a large number of users. However, such networks are extremely vulnerable to message dropping attacks by malicious or selfish nodes that intentionally drop packets they are required to forward. It is difficult to detect such attacks both efficiently and effectively, not mentioning to further identify the attackers, especially when members in the overlay switch between online/offline statuses frequently. We propose a random-sampling-based scheme to detect such attacks, and a path-resolving-based scheme to identify the attack nodes. Our schemes work for dynamic overlay networks and do not assume the global knowledge of the overlay hierarchy. Analysis and simulation results show that our schemes are bandwidthefficient and they both have high detection/identification rates but low false positive rates.
UR - http://www.scopus.com/inward/record.url?scp=50049104045&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=50049104045&partnerID=8YFLogxK
U2 - 10.1109/SECCOMW.2006.359534
DO - 10.1109/SECCOMW.2006.359534
M3 - Conference contribution
AN - SCOPUS:50049104045
SN - 1424404231
SN - 9781424404230
T3 - 2006 Securecomm and Workshops
BT - 2006 Securecomm and Workshops
Y2 - 28 August 2006 through 1 September 2006
ER -