A taxonomy of rational attacks

被引:0
|
作者
Nielson, SJ [1 ]
Crosby, SA [1 ]
Wallach, DS [1 ]
机构
[1] Rice Univ, Dept Comp Sci, Houston, TX 77251 USA
来源
PEER-TO-PEER SYSTEMS IV | 2005年 / 3640卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
For peer-to-peer services to be effective, participating nodes must cooperate, but in most scenarios a node represents a self-interested party and cooperation can neither be expected nor enforced. A reasonable assumption is that a large fraction of p2p nodes are rational and will attempt to maximize their consumption of system resources while minimizing the use of their own. If such behavior violates system policy then it constitutes an attack. In this paper we identify and create a taxonomy for rational attacks and then identify corresponding solutions if they exist. The most effective solutions directly incentivize cooperative behavior, but when this is not feasible the common alternative is to incentivize evidence of cooperation instead.
引用
收藏
页码:36 / 46
页数:11
相关论文
共 50 条
  • [1] A taxonomy of web attacks
    Alvarez, G
    Petrovic, S
    [J]. WEB ENGINEERING, PROCEEDINGS, 2003, 2722 : 295 - 298
  • [2] AN EXERCISE IN RATIONAL TAXONOMY
    HO, MW
    [J]. JOURNAL OF THEORETICAL BIOLOGY, 1990, 147 (01) : 43 - 57
  • [3] Concepts of rational taxonomy
    Pavlinov, I. Ya.
    [J]. ZHURNAL OBSHCHEI BIOLOGII, 2011, 72 (01): : 3 - 26
  • [4] A Novel Taxonomy of MANET Attacks
    Noureldien, Noureldien A.
    [J]. PROCEEDINGS OF 2015 INTERNATIONAL CONFERENCE ON ELECTRICAL AND INFORMATION TECHNOLOGIES (ICEIT 2015), 2015, : 109 - 113
  • [5] A Taxonomy for DOS attacks in VANET
    Kim, Yeongkwun
    Kim, Injoo
    Shim, Charlie Y.
    [J]. 2014 14th International Symposium on Communications and Information Technologies (ISCIT), 2014, : 26 - 27
  • [6] Taxonomy of DoS Attacks and Their Countermeasures
    Ramanauskaite, Simona
    Cenys, Antanas
    [J]. OPEN COMPUTER SCIENCE, 2011, 1 (03) : 355 - 366
  • [7] A Taxonomy of Web Service Attacks
    Chan, Ka Fai Peter
    Olivier, Martin
    van Heerden, Renier Pelser
    [J]. PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY (ICIW-2013), 2013, : 34 - 42
  • [8] A Taxonomy of Time and State Attacks
    Corcalciuc, Horia V.
    [J]. 2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 564 - 573
  • [9] A taxonomy of networks and computer attacks
    Hansman, S
    Hunt, R
    [J]. COMPUTERS & SECURITY, 2005, 24 (01) : 31 - 43
  • [10] A taxonomy of SQL Injection Attacks
    Sadeghian, Amirmohammad
    Zamani, Mazdak
    Abdullah, Shahidan M.
    [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATICS AND CREATIVE MULTIMEDIA (ICICM), 2013, : 269 - 273