Duck Attack on Accountable Distributed Systems

被引:0
|
作者
Kumar, Amrit [1 ]
Lauradoux, Cedric [2 ]
Lafourcade, Pascal [3 ]
机构
[1] Natl Univ Singapore, Singapore, Singapore
[2] INRIA, Paris, France
[3] Univ Clermont Auvergne, Clermont Ferrand, France
关键词
Accountability; Duck attack; Secure log; Public verifiability;
D O I
10.1145/3144457.3144480
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Accountability plays a key role in dependable distributed systems. It allows to detect, isolate and churn malicious/selfish nodes that deviate from a prescribed protocol. To achieve these properties, several accountable systems use at their core cryptographic primitives that produce non-repudiable evidence of inconsistent or incorrect behavior. In this paper, we show how selfish and colluding nodes can exploit the use of cryptographic digests in accountability protocols to mount what we call a duck attack. In a duck attack, selfish and colluding nodes exploit the use of cryptographic digests to alter the transmission of messages while masquerading as honest entities. The end result is that their selfish behavior remains undetected. This undermines the security guarantees of the accountability protocols. We first discover the duck attack while analyzing PAG - a custom cryptographic protocol to build accountable systems presented at ICDCS 2016. We later discover that accountable distributed systems based on a secure log (essentially a hash-based data structure) are also vulnerable to the duck attack and apply it on AcTinG - a protocol presented at SRDS 2014. To defeat our attack, we modify the underlying secure log to have high-order dependency on the messages stored in it.
引用
收藏
页码:303 / 312
页数:10
相关论文
共 50 条
  • [41] Distributed cyber-attack isolation for large-scale interconnected systems
    Gallo, Alexander J.
    Boem, Francesca
    Parisini, Thomas
    2021 EUROPEAN CONTROL CONFERENCE (ECC), 2021, : 48 - 53
  • [42] Service Reliability and Availability Analysis of Distributed Software Systems Considering Malware Attack
    Xiong, Cheng-Jie
    Li, Yan-Fu
    Xie, Min
    Ng, Szu-Hui
    Goh, Thong-Ngee
    ADVANCES IN SOFTWARE ENGINEERING, PROCEEDINGS, 2009, 59 : 313 - 320
  • [43] Distributed Deception Attack Detection in Platoon-Based Connected Vehicle Systems
    Ju, Zhiyang
    Zhang, Hui
    Tan, Ying
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (05) : 4609 - 4620
  • [44] Attack detectability and stealthiness in distributed optimal coordination of cyber-physical systems
    Liwei AN
    Guang-Hong YANG
    Science China(Information Sciences), 2023, 66 (09) : 301 - 302
  • [45] An effective placement of detection systems for distributed attack detection in large scale networks
    Jeong, SB
    Choi, YW
    Kim, S
    INFORMATION SECURITY APPLICATIONS, 2005, 3325 : 204 - 210
  • [46] Attack detectability and stealthiness in distributed optimal coordination of cyber-physical systems
    An, Liwei
    Yang, Guang-Hong
    SCIENCE CHINA-INFORMATION SCIENCES, 2023, 66 (09)
  • [47] Guard: Attack-Resilient Adaptive Load Balancing in Distributed Streaming Systems
    Daghistani, Anas
    Khayat, Mosab
    Felemban, Muhamad
    Aref, Walid G.
    Ghafoor, Arif
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (06) : 4172 - 4186
  • [48] A Distributed Observer for Consensus of Multi-Agent Systems Under Cyber Attack
    Yang, Jinman
    Li, Peng
    2023 AMERICAN CONTROL CONFERENCE, ACC, 2023, : 1062 - 1067
  • [49] Stealthy Attack Against Distributed State Estimation for Cyber-Physical Systems
    Wang, Jie
    Liu, Yun
    Yuan, Hongbo
    Yang, Wen
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2025, 35 (03) : 1091 - 1099
  • [50] Distributed Attack Graph Generation
    Kaynar, Kerem
    Sivrikaya, Fikret
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (05) : 519 - 532