Fake VIP Attacks and Their Mitigation via Double-Blind Reputation - Publication - Bridge of Knowledge

Search

Fake VIP Attacks and Their Mitigation via Double-Blind Reputation

Abstract

In a generic setting subsuming communication networks, resource sharing systems, and multi-agent communities, a client generates objects of various classes carrying class-dependent signatures, to which a server assigns class-dependent service quality. A Fake VIP attack consists in false declaration of a high class, with an awareness that detection of object signature at the server side is costly and so invoked reluctantly. We show that such attacks can be mitigated by a server-side double-blind repu-tation scheme. We offer a minimum-information framework for Fake VIP attacks and a stochastic analysis of a two-player Stackelberg game to find optimum attack and defense strategies, as well as to identify regions of operation where both the client and the server find the reputation scheme beneficial.

Citations

  • 0

    CrossRef

  • 0

    Web of Science

  • 2

    Scopus

Cite as

Full text

download paper
downloaded 61 times
Publication version
Accepted or Published Version
License
Copyright (2017 IEEE)

Keywords

Details

Category:
Conference activity
Type:
materiały konferencyjne indeksowane w Web of Science
Title of issue:
Proceedings of the 27th International Telecommunication Networks and Applications Conference (ITNAC) strony 1 - 8
Language:
English
Publication year:
2017
Bibliographic description:
Konorski J..: Fake VIP Attacks and Their Mitigation via Double-Blind Reputation, W: Proceedings of the 27th International Telecommunication Networks and Applications Conference (ITNAC), 2017, ,.
DOI:
Digital Object Identifier (open in new tab) 10.1109/atnac.2017.8215385
Bibliography: test
  1. J. Konorski and S. Szott, "Discouraging traffic remapping attacks in local ad hoc networks," IEEE Transactions on Wireless Communications, vol. 13, 7, pp. 3752-3767, July 2014. open in new tab
  2. S. Mangold, S. Choi, G. R. Hiertz, O. Klein, and B. Walke, "Analysis of IEEE 802.11e for QoS support in Wireless LANs," IEEE Wireless Communications, vol. 10, 6, pp. 40-50, Dec. 2003. open in new tab
  3. I.-R. Chen, F. Bao, and J. Guo, "Trust-based service management for Social Internet of Things systems, " IEEE Transactions on Dependable and Secure Computing, vol. 13, 6, pp. 684-696, Nov./Dec. 2016. open in new tab
  4. Po-Ching Lin, Ying-Dar Lin, Yuan-Cheng Lai, and Tsern-Huei Lee, "Using String Matching for Deep Packet Inspection," Computer, vol. 41, 4, pp. 23−28, April 2008. open in new tab
  5. Rasmussen E.: Games and Information: An Introduction to Game Theory, 3rd ed. Blackwell Publishers. 2001. open in new tab
  6. P. L. Bartlett. Online Prediction. http://stat.berkeley.edu/~bartlett/ papers/b-ol-16.pdf. 2015.
  7. A. Josang, R. Ismail, and C. Boyd, "A survey of trust and reputation systems for online service provision," Decision Support Systems, vol. 43, 2, pp. 618−644, March 2007. open in new tab
  8. Q. Liu, "Information acquisition and reputation dynamics," Review of Economic Studies, vol. 78, no. 4, pp. 1400-1425, 2011. open in new tab
  9. K. Hoffman, D. Zage, and C. Nita-Rotaru, "A survey of attack and defense techniques for reputation systems," ACM Computing Surveys, vol. 42, 1, Dec. 2009. open in new tab
  10. Y. Chae, L. C. DiPippo, and Y. L. Sun, "Trust management for defending on-off attacks," IEEE Transactions on Parallel and Distributed Systems, vol. 26, 4, pp. 1178−1191, April 2015. open in new tab
  11. M. H. Cheung, A. H. Mohsenian-Rad, V. W. Wong, and R. Schober, "Random access protocols for WLANs based on mechanism design," Proc. IEEE Int. Conf. on Comm. ICC'09, Dresden, Germany, June 2009. open in new tab
  12. S. H. Nguyen, L. L. Andrew, and H. L. Vu, "Service differentiation without prioritization in IEEE 802.11 WLANs," Proc. 36th IEEE Conf. on Local Computer Networks (LCN), Bonn, Germany, Oct 2011. open in new tab
  13. L. Galluccio, "A game-theoretic approach to prioritized transmission in wireless CSMA/CA networks," Proc. 69th IEEE Vehicular Technology Conf., Barcelona, Spain, April 2009. open in new tab
  14. M. Li and B. Prabhakaran, "MAC layer admission control and priority re-allocation for handling QoS guarantees in non-cooperative wireless LANs," Springer Mobile Networks and Applications, vol. 10, 6, pp. 947-959, Dec. 2005. open in new tab
  15. F. Hendrikx, K. Bubendorfer, and R. Chard, "Reputation systems: A survey and taxonomy," J. Parallel and Distrib. Comput., vol. 75, pp. 184-197, Jan. 2015. open in new tab
  16. Y. L. Sun and Y. Liu, "Security of online reputation systems: The evolution of attacks and defenses," IEEE Signal Proc. Mag., vol. 29, 2, pp. 87−97, March 2012.
  17. R. Kerr and R. Cohen, "Smart cheaters do prosper: Defeating trust and reputation systems," Proc. AAMS'09, Budapest, Hungary, May 2009. open in new tab
  18. Y. Freund, M. Kearns, Y. Mansour, D. Ron, R. Rubinfeld, and R. E. Schapire, "Efficient Algorithms for Learning to Play Repeated Games Against Computationally Bounded Adversaries," Proc. 36th Annual Symp. Foundations of Computer Science, Milwaukee WI, Nov. 1995. open in new tab
  19. A. Patcha and Jung-Min Park, "A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks," Int. J. of Network Security, vol. 2, 2, pp.131-137, March 2006. open in new tab
  20. Intel Corporation, "Delivering 160Gbps DPI performance on the Intel ® Xeon ® processor E5-2600 series using HyperScan," solution white paper, 2013. open in new tab
Verified by:
Gdańsk University of Technology

seen 89 times

Recommended for you

Meta Tags