Fake VIP Attacks and Their Mitigation via Double-Blind Reputation - Publikacja - MOST Wiedzy

Wyszukiwarka

Fake VIP Attacks and Their Mitigation via Double-Blind Reputation

Abstrakt

In a generic setting subsuming communication networks, resource sharing systems, and multi-agent communities, a client generates objects of various classes carrying class-dependent signatures, to which a server assigns class-dependent service quality. A Fake VIP attack consists in false declaration of a high class, with an awareness that detection of object signature at the server side is costly and so invoked reluctantly. We show that such attacks can be mitigated by a server-side double-blind repu-tation scheme. We offer a minimum-information framework for Fake VIP attacks and a stochastic analysis of a two-player Stackelberg game to find optimum attack and defense strategies, as well as to identify regions of operation where both the client and the server find the reputation scheme beneficial.

Cytowania

  • 0

    CrossRef

  • 0

    Web of Science

  • 0

    Scopus

Pełna treść

pobierz publikację
pobrano 15 razy

Licencja

Copyright (2017 IEEE)

Informacje szczegółowe

Kategoria:
Aktywność konferencyjna
Typ:
materiały konferencyjne indeksowane w Web of Science
Tytuł wydania:
Proceedings of the 27th International Telecommunication Networks and Applications Conference (ITNAC) strony 1 - 8
Język:
angielski
Rok wydania:
2017
Opis bibliograficzny:
Konorski J..: Fake VIP Attacks and Their Mitigation via Double-Blind Reputation, W: Proceedings of the 27th International Telecommunication Networks and Applications Conference (ITNAC), 2017, IEEE Communications Society,.
DOI:
Cyfrowy identyfikator dokumentu elektronicznego (otwiera się w nowej karcie) 10.1109/atnac.2017.8215385
Bibliografia: test
  1. J. Konorski and S. Szott, "Discouraging traffic remapping attacks in local ad hoc networks," IEEE Transactions on Wireless Communications, vol. 13, 7, pp. 3752-3767, July 2014. otwiera się w nowej karcie
  2. S. Mangold, S. Choi, G. R. Hiertz, O. Klein, and B. Walke, "Analysis of IEEE 802.11e for QoS support in Wireless LANs," IEEE Wireless Communications, vol. 10, 6, pp. 40-50, Dec. 2003. otwiera się w nowej karcie
  3. I.-R. Chen, F. Bao, and J. Guo, "Trust-based service management for Social Internet of Things systems, " IEEE Transactions on Dependable and Secure Computing, vol. 13, 6, pp. 684-696, Nov./Dec. 2016. otwiera się w nowej karcie
  4. Po-Ching Lin, Ying-Dar Lin, Yuan-Cheng Lai, and Tsern-Huei Lee, "Using String Matching for Deep Packet Inspection," Computer, vol. 41, 4, pp. 23−28, April 2008. otwiera się w nowej karcie
  5. Rasmussen E.: Games and Information: An Introduction to Game Theory, 3rd ed. Blackwell Publishers. 2001. otwiera się w nowej karcie
  6. P. L. Bartlett. Online Prediction. http://stat.berkeley.edu/~bartlett/ papers/b-ol-16.pdf. 2015.
  7. A. Josang, R. Ismail, and C. Boyd, "A survey of trust and reputation systems for online service provision," Decision Support Systems, vol. 43, 2, pp. 618−644, March 2007. otwiera się w nowej karcie
  8. Q. Liu, "Information acquisition and reputation dynamics," Review of Economic Studies, vol. 78, no. 4, pp. 1400-1425, 2011. otwiera się w nowej karcie
  9. K. Hoffman, D. Zage, and C. Nita-Rotaru, "A survey of attack and defense techniques for reputation systems," ACM Computing Surveys, vol. 42, 1, Dec. 2009. otwiera się w nowej karcie
  10. Y. Chae, L. C. DiPippo, and Y. L. Sun, "Trust management for defending on-off attacks," IEEE Transactions on Parallel and Distributed Systems, vol. 26, 4, pp. 1178−1191, April 2015. otwiera się w nowej karcie
  11. M. H. Cheung, A. H. Mohsenian-Rad, V. W. Wong, and R. Schober, "Random access protocols for WLANs based on mechanism design," Proc. IEEE Int. Conf. on Comm. ICC'09, Dresden, Germany, June 2009. otwiera się w nowej karcie
  12. S. H. Nguyen, L. L. Andrew, and H. L. Vu, "Service differentiation without prioritization in IEEE 802.11 WLANs," Proc. 36th IEEE Conf. on Local Computer Networks (LCN), Bonn, Germany, Oct 2011. otwiera się w nowej karcie
  13. L. Galluccio, "A game-theoretic approach to prioritized transmission in wireless CSMA/CA networks," Proc. 69th IEEE Vehicular Technology Conf., Barcelona, Spain, April 2009. otwiera się w nowej karcie
  14. M. Li and B. Prabhakaran, "MAC layer admission control and priority re-allocation for handling QoS guarantees in non-cooperative wireless LANs," Springer Mobile Networks and Applications, vol. 10, 6, pp. 947-959, Dec. 2005. otwiera się w nowej karcie
  15. F. Hendrikx, K. Bubendorfer, and R. Chard, "Reputation systems: A survey and taxonomy," J. Parallel and Distrib. Comput., vol. 75, pp. 184-197, Jan. 2015. otwiera się w nowej karcie
  16. Y. L. Sun and Y. Liu, "Security of online reputation systems: The evolution of attacks and defenses," IEEE Signal Proc. Mag., vol. 29, 2, pp. 87−97, March 2012.
  17. R. Kerr and R. Cohen, "Smart cheaters do prosper: Defeating trust and reputation systems," Proc. AAMS'09, Budapest, Hungary, May 2009. otwiera się w nowej karcie
  18. Y. Freund, M. Kearns, Y. Mansour, D. Ron, R. Rubinfeld, and R. E. Schapire, "Efficient Algorithms for Learning to Play Repeated Games Against Computationally Bounded Adversaries," Proc. 36th Annual Symp. Foundations of Computer Science, Milwaukee WI, Nov. 1995. otwiera się w nowej karcie
  19. A. Patcha and Jung-Min Park, "A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks," Int. J. of Network Security, vol. 2, 2, pp.131-137, March 2006. otwiera się w nowej karcie
  20. Intel Corporation, "Delivering 160Gbps DPI performance on the Intel ® Xeon ® processor E5-2600 series using HyperScan," solution white paper, 2013. otwiera się w nowej karcie
Weryfikacja:
Politechnika Gdańska

wyświetlono 29 razy

Publikacje, które mogą cię zainteresować

Meta Tagi