首页> 外文会议>Recent advances in intrusion detection >Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack
【24h】

Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack

机译:保护应用程序级拓扑估计网络:面对青蛙沸腾的攻击

获取原文
获取原文并翻译 | 示例

摘要

Peer-to-peer real-time communication and media streaming applications optimize their performance by using application-level topology estimation services such as virtual coordinate systems. Virtual coordinate systems allow nodes in a peer-to-peer network to accurately predict latency between arbitrary nodes without the need of performing extensive measurements. However, systems that leverage virtual coordinates as supporting building blocks, are prone to attacks conducted by compromised nodes that aim at disrupting, eavesdropping, or mangling with the underlying communications. Recent research proposed techniques to mitigate basic attacks (inflation, deflation, oscillation) considering a single attack strategy model where attackers perform only one type of attack. In this work we explore supervised machine learning techniques to mitigate more subtle yet highly effective attacks (frog-boiling, network-partition) that are able to bypass existing defenses. We evaluate our techniques on the Vivaldi system against a more complex attack strategy model, where attackers perform sequences of all known attacks against virtual coordinate systems, using both simulations and Internet deployments.
机译:对等实时通信和媒体流应用程序通过使用诸如虚拟坐标系之类的应用程序级拓扑估计服务来优化其性能。虚拟坐标系允许对等网络中的节点准确地预测任意节点之间的等待时间,而无需执行大量测量。但是,利用虚拟坐标作为支持构建基块的系统容易受到受感染节点的攻击,这些攻击旨在破坏,窃听或破坏基础通信。最近的研究提出了一种缓解基本攻击(通货膨胀,通货紧缩,振荡)的技术,其中考虑了攻击者仅执行一种攻击的单一攻击策略模型。在这项工作中,我们探索有监督的机器学习技术,以减轻能够绕过现有防御的更微妙而又高效的攻击(青蛙沸腾,网络分区)。我们根据更复杂的攻击策略模型评估Vivaldi系统上的技术,在该模型中,攻击者使用模拟和Internet部署对虚拟坐标系执行所有已知攻击的序列。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号