2011
DOI: 10.1007/978-3-642-23644-0_11
|View full text |Cite
|
Sign up to set email alerts
|

Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack

Abstract: Abstract. Peer-to-peer real-time communication and media streaming applications optimize their performance by using application-level topology estimation services such as virtual coordinate systems. Virtual coordinate systems allow nodes in a peer-to-peer network to accurately predict latency between arbitrary nodes without the need of performing extensive measurements. However, systems that leverage virtual coordinates as supporting building blocks, are prone to attacks conducted by compromised nodes that aim… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 28 publications
(36 reference statements)
0
2
0
Order By: Relevance
“…bandwidth, storage for a tamper-evident log, and computation for public-key cryptography), we do not compare Newton with them. Becker et al [33] propose a method for detecting frog-boiling by using a machine learning approach, where through a training data set the system learns what normal and abnormal data is. In contrast, our approach has no need to train the system and can detect abnormal behavior directly due to the applied physical laws.…”
Section: B Attack Mitigationmentioning
confidence: 99%
See 1 more Smart Citation
“…bandwidth, storage for a tamper-evident log, and computation for public-key cryptography), we do not compare Newton with them. Becker et al [33] propose a method for detecting frog-boiling by using a machine learning approach, where through a training data set the system learns what normal and abnormal data is. In contrast, our approach has no need to train the system and can detect abnormal behavior directly due to the applied physical laws.…”
Section: B Attack Mitigationmentioning
confidence: 99%
“…In contrast, our approach has no need to train the system and can detect abnormal behavior directly due to the applied physical laws. Furthermore, while [33] can detect attacks are occuring but not find and discard the updates that are causing it, Newton is able to do both.…”
Section: B Attack Mitigationmentioning
confidence: 99%