A taxonomy of rational attacks

被引:0
|
作者
Nielson, SJ [1 ]
Crosby, SA [1 ]
Wallach, DS [1 ]
机构
[1] Rice Univ, Dept Comp Sci, Houston, TX 77251 USA
来源
PEER-TO-PEER SYSTEMS IV | 2005年 / 3640卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
For peer-to-peer services to be effective, participating nodes must cooperate, but in most scenarios a node represents a self-interested party and cooperation can neither be expected nor enforced. A reasonable assumption is that a large fraction of p2p nodes are rational and will attempt to maximize their consumption of system resources while minimizing the use of their own. If such behavior violates system policy then it constitutes an attack. In this paper we identify and create a taxonomy for rational attacks and then identify corresponding solutions if they exist. The most effective solutions directly incentivize cooperative behavior, but when this is not feasible the common alternative is to incentivize evidence of cooperation instead.
引用
收藏
页码:36 / 46
页数:11
相关论文
共 50 条
  • [21] A Taxonomy of Attacks Using BGP Blackholing
    Miller, Loic
    Pelsser, Cristel
    [J]. COMPUTER SECURITY - ESORICS 2019, PT I, 2019, 11735 : 107 - 127
  • [22] A taxonomy and survey of attacks on digital signatures
    Hernandez-Ardieta, Jorge L.
    Gonzalez-Tablas, Ana I.
    de Fuentes, Jose M.
    Ramos, Benjamin
    [J]. COMPUTERS & SECURITY, 2013, 34 : 67 - 112
  • [23] Taxonomy of Cyber Attacks and Simulation of their Effects
    Chapman, Ian M.
    Leblanc, Sylvain P.
    Partington, Andrew
    [J]. MILITARY MODELING & SIMULATION SYMPOSIUM 2011 (MMS 2011) - 2011 SPRING SIMULATION MULTICONFERENCE - BK 7 OF 8, 2011, : 73 - 80
  • [24] Taxonomy of attacks on Industrial Control protocols
    Drias, Zakarya
    Serhrouchni, Ahmed
    Vogel, Olivier
    [J]. 2015 INTERNATIONAL CONFERENCE ON PROTOCOL ENGINEERING (ICPE) AND INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES OF DISTRIBUTED SYSTEMS (NTDS), 2015,
  • [25] Mobile Botnet Attacks: A Thematic Taxonomy
    Karim, Ahmad
    Shah, Syed Adeel Ali
    Salleh, Rosli
    [J]. NEW PERSPECTIVES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 2, 2014, 276 : 153 - 164
  • [26] A Taxonomy of Distributed Denial of Service Attacks
    De Donno, Michele
    Giaretta, Alberto
    Dragoni, Nicola
    Spognardi, Angelo
    [J]. 2017 INTERNATIONAL CONFERENCE ON INFORMATION SOCIETY (I-SOCIETY 2017), 2017, : 100 - 107
  • [27] A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks
    Heartfield, Ryan
    Loukas, George
    [J]. ACM COMPUTING SURVEYS, 2015, 48 (03)
  • [28] Rational Protection Against Timing Attacks
    Doychev, Goran
    Kopf, Boris
    [J]. 2015 IEEE 28TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM CSF 2015, 2015, : 526 - 536
  • [29] A Rational Protocol Treatment of 51% Attacks
    Badertscher, Christian
    Lu, Yun
    Zikas, Vassals
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT III, 2021, 12827 : 3 - 32
  • [30] Rational Protocols and Attacks in Blockchain System
    Li, Tao
    Chen, Yuling
    Wang, Yanli
    Wang, Yilei
    Zhao, Minghao
    Zhu, Haojia
    Tian, Youliang
    Yu, Xiaomei
    Yang, Yixian
    [J]. Chen, Yuling (ylchen3@gzu.edu.cn), 1600, Hindawi Limited (2020):