2009
DOI: 10.1016/j.comnet.2009.03.008
|View full text |Cite
|
Sign up to set email alerts
|

Brahms: Byzantine resilient random membership sampling

Abstract: We present Brahms, an algorithm for sampling random nodes in a large dynamic system prone to malicious behavior. Brahms stores small membership views at each node, and yet overcomes Byzantine attacks by a linear portion of the system. Brahms is composed of two components. The first one is a resilient gossip-based membership protocol. The second one uses a novel memory-efficient approach for uniform sampling from a possibly biased stream of ids that traverse the node. We evaluate Brahms using rigorous analysis,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
116
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 82 publications
(118 citation statements)
references
References 42 publications
2
116
0
Order By: Relevance
“…This is achieved by using full membership (i.e., the nodes know the list of all other nodes in the system) or a random peer sampling protocol, e.g., [33,27]. Such sampling protocols can be made robust to byzantine attacks by using techniques such as Brahms [6]. Indeed, a node might be tempted to tamper with the peer sampling service in order to be chosen, and thus served content, more frequently by other nodes.…”
Section: Model and Gossip Protocolmentioning
confidence: 99%
“…This is achieved by using full membership (i.e., the nodes know the list of all other nodes in the system) or a random peer sampling protocol, e.g., [33,27]. Such sampling protocols can be made robust to byzantine attacks by using techniques such as Brahms [6]. Indeed, a node might be tempted to tamper with the peer sampling service in order to be chosen, and thus served content, more frequently by other nodes.…”
Section: Model and Gossip Protocolmentioning
confidence: 99%
“…Brahms [71], the Secure Peer Sampling [72], and PuppetCast [73] are three examples of PSS protocols that take into account the presence of byzantine nodes wishing to bias the sampling.…”
Section: Gossip-based Networking and Security Aspectsmentioning
confidence: 99%
“…Fireflies [17], for instance, builds a randomized intrusion-tolerant overlay on which Byzantine nodes have only a limited control, and is resilient to the eclipse attack (i.e., no node has only Byzantine neighbors [36]). Brahms [3] provides unbiased uniform random peer-sampling in the presence of Byzantine nodes. Finally, AVMON [23] builds a pseudo-random overlay based on the hashes of the nodes' IP addresses (on which malicious nodes have very little, if any, control) thus reducing the , and has proxies of its own in the successive group g i+1 .…”
Section: System Modelmentioning
confidence: 99%