A taxonomy of rational attacks

被引:0
|
作者
Nielson, SJ [1 ]
Crosby, SA [1 ]
Wallach, DS [1 ]
机构
[1] Rice Univ, Dept Comp Sci, Houston, TX 77251 USA
来源
PEER-TO-PEER SYSTEMS IV | 2005年 / 3640卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
For peer-to-peer services to be effective, participating nodes must cooperate, but in most scenarios a node represents a self-interested party and cooperation can neither be expected nor enforced. A reasonable assumption is that a large fraction of p2p nodes are rational and will attempt to maximize their consumption of system resources while minimizing the use of their own. If such behavior violates system policy then it constitutes an attack. In this paper we identify and create a taxonomy for rational attacks and then identify corresponding solutions if they exist. The most effective solutions directly incentivize cooperative behavior, but when this is not feasible the common alternative is to incentivize evidence of cooperation instead.
引用
收藏
页码:36 / 46
页数:11
相关论文
共 50 条
  • [41] A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks
    Amin, Yasmin M.
    Abdel-Hamid, Amr T.
    [J]. JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2016, 2016 (2016)
  • [42] A formalized taxonomy of DDoS attacks based on similarity
    Kang, Jian
    Zhang, Yuan
    Ju, Jiu-Bin
    [J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3975 : 717 - 719
  • [43] A TAXONOMY OF ATTACKS ON THE DNP3 PROTOCOL
    East, Samuel
    Butts, Jonathan
    Papa, Mauricio
    Shenoi, Sujeet
    [J]. CRITICAL INFRASTRUCTURE PROTECTION III, 2009, 311 : 67 - 81
  • [44] A survey and taxonomy of DoS attacks in cloud computing
    Masdari, Mohammad
    Jalali, Marzie
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3724 - 3751
  • [45] A taxonomy of privilege escalation attacks in Android applications
    Rangwala, Mohammed
    Zhang, Ping
    Zou, Xukai
    Li, Feng
    [J]. International Journal of Security and Networks, 2014, 9 (01) : 40 - 55
  • [46] Taxonomy of Man-in-the-Middle Attacks on HTTPS
    Stricot-Tarboton, Shaun
    Chaisiri, Sivadon
    Ko, Ryan K. L.
    [J]. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 527 - 534
  • [47] A Comprehensive Survey of Social Engineering Attacks: Taxonomy of Attacks, Prevention, and Mitigation Strategies
    Birthriya, Santosh Kumar
    Ahlawat, Priyanka
    Jain, Ankit Kumar
    [J]. JOURNAL OF APPLIED SECURITY RESEARCH, 2024,
  • [48] ECOLOGY, TAXONOMY AND RATIONAL LAND USE IN AFRICA
    HEDBERG, I
    HEDBERG, O
    [J]. BOTANISKA NOTISER, 1972, 125 (04): : 483 - 486
  • [49] The development of rational thought: A taxonomy of heuristics and biases
    Stanovich, Keith E.
    Toplak, Maggie E.
    West, Richard F.
    [J]. ADVANCES IN CHILD DEVELOPMENT AND BEHAVIOR, VOL 36, 2008, 36 : 251 - 285
  • [50] HOW RATIONAL CAN RATIONAL MORPHOLOGY BE - A POST-DARWINIAN RATIONAL TAXONOMY BASED ON A STRUCTURALISM OF PROCESS
    HO, MW
    [J]. RIVISTA DI BIOLOGIA-BIOLOGY FORUM, 1988, 81 (01): : 11 - 55