2009 Eighth International Conference on Networks 2009
DOI: 10.1109/icn.2009.40
|View full text |Cite
|
Sign up to set email alerts
|

Assessment of Vulnerability of Content Adaptation Mechanisms to RoQ Attacks

Abstract: Abstract-Current computing systems employ different mechanisms to deal with overload conditions. Of those widely deployed are content adaptation mechanisms whereby the quality level of the content is adapted dynamically to mitigate overload conditions. Serving degraded content reduces strain on resources and enables them to cater for a larger set of clients. To that end, this paper studies adversarial exploits of dynamic content adaptation mechanisms to a new instantiation of Reduction of Quality (RoQ) attacks… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…Although this is very representative, detecting and defending methods against it still have some limitations. RoQ attacks also exist in many other adaptation mechanism deployed systems, such as content adaptation or admission control targeted RoQ attacks [2], [3]. These attacks severely damage the service QoS to normal clients supplied by the victim system, through misguiding the decision process of the system's adaptation control mechanism.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Although this is very representative, detecting and defending methods against it still have some limitations. RoQ attacks also exist in many other adaptation mechanism deployed systems, such as content adaptation or admission control targeted RoQ attacks [2], [3]. These attacks severely damage the service QoS to normal clients supplied by the victim system, through misguiding the decision process of the system's adaptation control mechanism.…”
Section: Introductionmentioning
confidence: 99%
“…The attack principle and defending methods has been studied in many papers [1], [2], [3], [4], [5], [6], [7], [8], [9]. As one of the earliest kind of attack be put forward, TCP congestion control mechanism targeted RoQ attack which be called shrew attack [1] has been discussed most frequently.…”
Section: Introductionmentioning
confidence: 99%