Duck Attack on Accountable Distributed Systems

被引:0
|
作者
Kumar, Amrit [1 ]
Lauradoux, Cedric [2 ]
Lafourcade, Pascal [3 ]
机构
[1] Natl Univ Singapore, Singapore, Singapore
[2] INRIA, Paris, France
[3] Univ Clermont Auvergne, Clermont Ferrand, France
关键词
Accountability; Duck attack; Secure log; Public verifiability;
D O I
10.1145/3144457.3144480
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Accountability plays a key role in dependable distributed systems. It allows to detect, isolate and churn malicious/selfish nodes that deviate from a prescribed protocol. To achieve these properties, several accountable systems use at their core cryptographic primitives that produce non-repudiable evidence of inconsistent or incorrect behavior. In this paper, we show how selfish and colluding nodes can exploit the use of cryptographic digests in accountability protocols to mount what we call a duck attack. In a duck attack, selfish and colluding nodes exploit the use of cryptographic digests to alter the transmission of messages while masquerading as honest entities. The end result is that their selfish behavior remains undetected. This undermines the security guarantees of the accountability protocols. We first discover the duck attack while analyzing PAG - a custom cryptographic protocol to build accountable systems presented at ICDCS 2016. We later discover that accountable distributed systems based on a secure log (essentially a hash-based data structure) are also vulnerable to the duck attack and apply it on AcTinG - a protocol presented at SRDS 2014. To defeat our attack, we modify the underlying secure log to have high-order dependency on the messages stored in it.
引用
收藏
页码:303 / 312
页数:10
相关论文
共 50 条
  • [1] Accountable and Distributed Industrial Control Systems with Autonomous Contracts
    Makhijani, Kiran
    Faisal, Tooba
    2023 26TH CONFERENCE ON INNOVATION IN CLOUDS, INTERNET AND NETWORKS AND WORKSHOPS, ICIN, 2023,
  • [2] Reimagining Robust Distributed Systems Through Accountable MAS
    Baldoni, Matteo
    Baroglio, Cristina
    Micalizio, Roberto
    Tedeschi, Stefano
    IEEE INTERNET COMPUTING, 2021, 25 (06) : 7 - 14
  • [3] Enabling Accountable Collaboration in Distributed, Autonomous Systems by Intelligent Agents
    Amato, Flora
    Femia, Pasquale
    Moscato, Francesco
    COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS (CISIS 2019), 2020, 993 : 807 - 816
  • [4] Attack detection of nonlinear distributed control systems
    Zhang, Xu
    Lu, Yang
    Zhu, Minghui
    2020 AMERICAN CONTROL CONFERENCE (ACC), 2020, : 1459 - 1464
  • [5] Distributed attack reconstruction for networked motion control systems
    Zhu J.-W.
    Liang C.-Y.
    He D.-F.
    Kongzhi yu Juece/Control and Decision, 2022, 37 (11): : 2934 - 2940
  • [6] Design of Attack Tolerant Detection Topologies For Distributed Systems
    Nazari, Sam
    Shafai, Bahram
    Oghbaee, Amirreza
    2017 IEEE 56TH ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2017,
  • [7] Distributed Cyber Attack Detection for Power Network Systems
    Hashimoto, Hideaki
    Hayakawa, Tomohisa
    2011 50TH IEEE CONFERENCE ON DECISION AND CONTROL AND EUROPEAN CONTROL CONFERENCE (CDC-ECC), 2011, : 5820 - 5824
  • [8] A Generic Metamodel for IT Security - Attack Modeling for Distributed Systems
    Miede, Andre
    Nedyalkov, Nedislav
    Gottron, Christian
    Koenig, Andre
    Repp, Nicolas
    Steinmetz, Ralf
    FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 430 - 437
  • [9] Designing Accountable Systems
    Kacianka, Severin
    Pretschner, Alexander
    PROCEEDINGS OF THE 2021 ACM CONFERENCE ON FAIRNESS, ACCOUNTABILITY, AND TRANSPARENCY, FACCT 2021, 2021, : 424 - 437
  • [10] Attack Detection and Distributed Filtering for State-Saturated Systems Under Deception Attack
    Li, Li
    Yang, Huan
    Xia, Yuanqing
    Zhu, Cui
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2021, 8 (04): : 1918 - 1929