2012
DOI: 10.1007/978-3-642-27937-9_1
|View full text |Cite
|
Sign up to set email alerts
|

BloomCasting: Security in Bloom Filter Based Multicast

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
10
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 22 publications
0
10
0
Order By: Relevance
“…The observable case is a packet with all-ones filter: In which a packet is forwarded to all nodes and the packet loops around and cycles in the network. M. Särelä et al [4], [10] figured out that false positives can also result in un-wanted loops if a packet is mistakenly sent back to an previous node in the multicast tree, and false positives among two paths of the multicast tree may result in flow duplication. To overcome these issues, M. Särelä et al suggested per router permutation of bloom filters.…”
Section: H Forwarding Anomalies and Bit Permutationsmentioning
confidence: 99%
“…The observable case is a packet with all-ones filter: In which a packet is forwarded to all nodes and the packet loops around and cycles in the network. M. Särelä et al [4], [10] figured out that false positives can also result in un-wanted loops if a packet is mistakenly sent back to an previous node in the multicast tree, and false positives among two paths of the multicast tree may result in flow duplication. To overcome these issues, M. Särelä et al suggested per router permutation of bloom filters.…”
Section: H Forwarding Anomalies and Bit Permutationsmentioning
confidence: 99%
“…Two main hostile attacks are the chain reaction attack and the target path attack [14]. The first is to trigger occurrence of forwarding anomalies, and the second is to converge as many packet flows as possible on a particular path with a large number of zombie hosts.…”
Section: Core Design Issuesmentioning
confidence: 99%
“…The typical value of r max is set to approximately 0.5, which strikes a balance between space efficiency and false positive rate [14]. Varying the structure of the Bloom filter such as the number of hash functions or the order of 1-bit positions can also improve the security level.…”
Section: Core Design Issuesmentioning
confidence: 99%
See 1 more Smart Citation
“…In each network, a maximum value, m , of fill factor is allowed and hence any packet with a Bloom filter of , where > m , is automatically dropped. This is required because otherwise an attacker could simply create a packet of all one values and launch a DDoS attack or send unwanted traffic to every user in the network [25,24]. A Bloom filter with a maximum fill factor is called maximally filled and hence no more LIDs can be inserted.…”
mentioning
confidence: 99%