In this paper we explore an important issue for many over-lay networks- the presence of compromised nodes and how they affect the operation of the system. In overlay networks, compromised nodes can drop, delay or in other ways subvert user traffic and break protocols required for the successful operation of the system. We take a game theoretic approach to model the characteristics of a com-promised node and an altruistic legitimate node who wishes to identify the compromised node. We first prove that the damage that can be done by the attacker has an up-per bound. We then describe the operation of the system that can operate in the presence of compromised nodes by enforcing this upper bound on attacker damage
A digital security breach, by which confidential information is leaked, does not only affect the age...
Abstract — Distributed denial-of-service attacks on public servers have recently become more serious...
Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although ...
Abstract. Due to the increasing security threats in the Internet, new overlay network architectures ...
Due to the increasing security threats on the Internet, new overlay network architectures have been ...
Overlay networks are widely used to deploy functionality at edge nodes without changing network rout...
Abstract — Overlay networks are widely used to deploy functionality at edge nodes without changing n...
As we increase our dependency upon networked communication, the incentive to compromise and degrade ...
Every peer-to-peer system is based on some overlay network connecting its peers. Many of the overlay...
servers have recently become more serious. Most of them are SYN flood attacks, since the malicious a...
Overlay networks are widely used to deploy functionality at edge nodes without changing network rout...
Security breaches and attacks are critical problems in today’s networking. A key-point is that the s...
Abstract In order to perform private communication over public networks, such as the Internet, sever...
Abstract—The heterogeneity present in the real-world net-works like peer-to-peer networks make them ...
Abstract 1 A number of recent applications have been built on distributed hash tables (DHTs) based o...
A digital security breach, by which confidential information is leaked, does not only affect the age...
Abstract — Distributed denial-of-service attacks on public servers have recently become more serious...
Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although ...
Abstract. Due to the increasing security threats in the Internet, new overlay network architectures ...
Due to the increasing security threats on the Internet, new overlay network architectures have been ...
Overlay networks are widely used to deploy functionality at edge nodes without changing network rout...
Abstract — Overlay networks are widely used to deploy functionality at edge nodes without changing n...
As we increase our dependency upon networked communication, the incentive to compromise and degrade ...
Every peer-to-peer system is based on some overlay network connecting its peers. Many of the overlay...
servers have recently become more serious. Most of them are SYN flood attacks, since the malicious a...
Overlay networks are widely used to deploy functionality at edge nodes without changing network rout...
Security breaches and attacks are critical problems in today’s networking. A key-point is that the s...
Abstract In order to perform private communication over public networks, such as the Internet, sever...
Abstract—The heterogeneity present in the real-world net-works like peer-to-peer networks make them ...
Abstract 1 A number of recent applications have been built on distributed hash tables (DHTs) based o...
A digital security breach, by which confidential information is leaked, does not only affect the age...
Abstract — Distributed denial-of-service attacks on public servers have recently become more serious...
Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although ...