Abstract — Adaptive measurement-based overlay networks of-fer increased performance and resilience to benign failures for end-to-end communication by using aggressive adaptivity mech-anisms. These mechanisms dynamically optimize application-centric metrics such as latency, jitter, bandwidth, and loss rate. However, end-systems are more vulnerable than core routers, making overlay networks susceptible to malicious attacks coming from untrusted outsiders, and especially from trusted (but compromised) members of the overlay. Unlike outsider attacks, insider (or Byzantine) attacks can not be prevented by sim-ply deploying cryptographic authentication mechanisms. In this work, we identify and classify insider attacks against adaptivity mechanism...
This dissertation provides strong resilience techniques applying to general networks. Examples of im...
Abstract—The heterogeneity present in the real-world net-works like peer-to-peer networks make them ...
Abstract 1 A number of recent applications have been built on distributed hash tables (DHTs) based o...
Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although ...
Abstract In order to perform private communication over public networks, such as the Internet, sever...
Every peer-to-peer system is based on some overlay network connecting its peers. Many of the overlay...
19International audienceAwerbuch and Scheideler have shown that peer-to-peer overlay networks can su...
International audienceScheideler has shown that peer-to-peer overlays networks can only survive Byza...
As we increase our dependency upon networked communication, the incentive to compromise and degrade ...
Awerbuch and Scheideler have shown that peer-to-peer overlays networks can survive Byzantine attacks...
Overlay networks are widely used to deploy functionality at edge nodes without changing network rout...
Ad-hoc networks are an emerging area of mobile computing and an efficient paradigm for multicast com...
Abstract — Overlay networks are widely used to deploy functionality at edge nodes without changing n...
In the framework of a set of clients communicating with a critical server over the Internet, a recen...
Protection against Denial of Service (DoS) attacks is a challenging and ongoing problem. Current ove...
This dissertation provides strong resilience techniques applying to general networks. Examples of im...
Abstract—The heterogeneity present in the real-world net-works like peer-to-peer networks make them ...
Abstract 1 A number of recent applications have been built on distributed hash tables (DHTs) based o...
Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although ...
Abstract In order to perform private communication over public networks, such as the Internet, sever...
Every peer-to-peer system is based on some overlay network connecting its peers. Many of the overlay...
19International audienceAwerbuch and Scheideler have shown that peer-to-peer overlay networks can su...
International audienceScheideler has shown that peer-to-peer overlays networks can only survive Byza...
As we increase our dependency upon networked communication, the incentive to compromise and degrade ...
Awerbuch and Scheideler have shown that peer-to-peer overlays networks can survive Byzantine attacks...
Overlay networks are widely used to deploy functionality at edge nodes without changing network rout...
Ad-hoc networks are an emerging area of mobile computing and an efficient paradigm for multicast com...
Abstract — Overlay networks are widely used to deploy functionality at edge nodes without changing n...
In the framework of a set of clients communicating with a critical server over the Internet, a recen...
Protection against Denial of Service (DoS) attacks is a challenging and ongoing problem. Current ove...
This dissertation provides strong resilience techniques applying to general networks. Examples of im...
Abstract—The heterogeneity present in the real-world net-works like peer-to-peer networks make them ...
Abstract 1 A number of recent applications have been built on distributed hash tables (DHTs) based o...