Duck Attack on Accountable Distributed Systems

被引:0
|
作者
Kumar, Amrit [1 ]
Lauradoux, Cedric [2 ]
Lafourcade, Pascal [3 ]
机构
[1] Natl Univ Singapore, Singapore, Singapore
[2] INRIA, Paris, France
[3] Univ Clermont Auvergne, Clermont Ferrand, France
关键词
Accountability; Duck attack; Secure log; Public verifiability;
D O I
10.1145/3144457.3144480
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Accountability plays a key role in dependable distributed systems. It allows to detect, isolate and churn malicious/selfish nodes that deviate from a prescribed protocol. To achieve these properties, several accountable systems use at their core cryptographic primitives that produce non-repudiable evidence of inconsistent or incorrect behavior. In this paper, we show how selfish and colluding nodes can exploit the use of cryptographic digests in accountability protocols to mount what we call a duck attack. In a duck attack, selfish and colluding nodes exploit the use of cryptographic digests to alter the transmission of messages while masquerading as honest entities. The end result is that their selfish behavior remains undetected. This undermines the security guarantees of the accountability protocols. We first discover the duck attack while analyzing PAG - a custom cryptographic protocol to build accountable systems presented at ICDCS 2016. We later discover that accountable distributed systems based on a secure log (essentially a hash-based data structure) are also vulnerable to the duck attack and apply it on AcTinG - a protocol presented at SRDS 2014. To defeat our attack, we modify the underlying secure log to have high-order dependency on the messages stored in it.
引用
收藏
页码:303 / 312
页数:10
相关论文
共 50 条
  • [21] Analysis of Attack-Defense Strategies in Autonomous Distributed IoT Systems
    Al-Hamadi, Hamid
    Chen, Ing-Ray
    Wang, Ding-Chau
    2019 IEEE 14TH INTERNATIONAL SYMPOSIUM ON AUTONOMOUS DECENTRALIZED SYSTEM (ISADS), 2019, : 37 - 42
  • [22] Attack Detection and Isolation for Distributed Load Shedding Algorithm in Microgrid Systems
    Yan, Jiaqi
    Guo, Fanghong
    Wen, Changyun
    Guo, Fanghong (fhguo@zjut.edu.cn), 1600, Institute of Electrical and Electronics Engineers Inc. (01): : 102 - 110
  • [23] Intrusion Detection Systems' Performance for Distributed Denial-of-Service Attack
    de Sousa Araujo, Tiago Emilio
    Matos, Fernando Menezes
    Moreira, Josilene Aires
    2017 CHILEAN CONFERENCE ON ELECTRICAL, ELECTRONICS ENGINEERING, INFORMATION AND COMMUNICATION TECHNOLOGIES (CHILECON), 2017,
  • [24] Recursive Filtering of Distributed Cyber-Physical Systems With Attack Detection
    Ding, Derui
    Han, Qing-Long
    Wang, Zidong
    Ge, Xiaohua
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (10): : 6466 - 6476
  • [25] Attack-resilient compliance monitoring for large distributed infrastructure systems
    Montanari M.
    Campbell R.H.
    Proceedings - 2011 5th International Conference on Network and System Security, NSS 2011, 2011, : 192 - 199
  • [26] CASL: A Novel Collusion Attack Against Distributed Energy Management Systems
    Ye, Feng
    Cao, Xianghui
    Cheng, Zheyuan
    Chow, Mo-Yuen
    IEEE TRANSACTIONS ON SMART GRID, 2023, 14 (06) : 4717 - 4728
  • [27] Attack and Defense Strategies for Intrusion Detection in Autonomous Distributed IoT Systems
    Al-Hamadi, Hamid
    Chen, Ing-Ray
    Wang, Ding-Chau
    Almashan, Meshal
    IEEE ACCESS, 2020, 8 : 168994 - 169009
  • [28] Duck Hunt: Memory forensics of USB attack platforms
    Thomas, Tyler
    Piscitelli, Mathew
    Nahar, Bhavik Ashok
    Baggili, Ibrahim
    FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2021, 37
  • [29] Accountable care systems and accountable care organisations in the NHS: progress or route to privatisation?
    Moberly, Tom
    BMJ-BRITISH MEDICAL JOURNAL, 2017, 358
  • [30] Accountable AI for Healthcare IoT Systems
    Bagave, Prachi
    Westberg, Marcus
    Dobbe, Roel
    Janssen, Marijn
    Ding, Aaron Yi
    2022 IEEE 4TH INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS, AND APPLICATIONS, TPS-ISA, 2022, : 20 - 28