Abstrakt
In a generic setting subsuming communication networks, resource sharing systems, and multi-agent communities, a client generates objects of various classes carrying class-dependent signatures, to which a server assigns class-dependent service quality. A Fake VIP attack consists in false declaration of a high class, with an awareness that detection of object signature at the server side is costly and so invoked reluctantly. We show that such attacks can be mitigated by a server-side double-blind repu-tation scheme. We offer a minimum-information framework for Fake VIP attacks and a stochastic analysis of a two-player Stackelberg game to find optimum attack and defense strategies, as well as to identify regions of operation where both the client and the server find the reputation scheme beneficial.
Cytowania
-
0
CrossRef
-
0
Web of Science
-
2
Scopus
Autor (1)
Cytuj jako
Pełna treść
- Wersja publikacji
- Accepted albo Published Version
- Licencja
- Copyright (2017 IEEE)
Słowa kluczowe
Informacje szczegółowe
- Kategoria:
- Aktywność konferencyjna
- Typ:
- materiały konferencyjne indeksowane w Web of Science
- Tytuł wydania:
- Proceedings of the 27th International Telecommunication Networks and Applications Conference (ITNAC) strony 1 - 8
- Język:
- angielski
- Rok wydania:
- 2017
- Opis bibliograficzny:
- Konorski J..: Fake VIP Attacks and Their Mitigation via Double-Blind Reputation, W: Proceedings of the 27th International Telecommunication Networks and Applications Conference (ITNAC), 2017, ,.
- DOI:
- Cyfrowy identyfikator dokumentu elektronicznego (otwiera się w nowej karcie) 10.1109/atnac.2017.8215385
- Bibliografia: test
-
- J. Konorski and S. Szott, "Discouraging traffic remapping attacks in local ad hoc networks," IEEE Transactions on Wireless Communications, vol. 13, 7, pp. 3752-3767, July 2014. otwiera się w nowej karcie
- S. Mangold, S. Choi, G. R. Hiertz, O. Klein, and B. Walke, "Analysis of IEEE 802.11e for QoS support in Wireless LANs," IEEE Wireless Communications, vol. 10, 6, pp. 40-50, Dec. 2003. otwiera się w nowej karcie
- I.-R. Chen, F. Bao, and J. Guo, "Trust-based service management for Social Internet of Things systems, " IEEE Transactions on Dependable and Secure Computing, vol. 13, 6, pp. 684-696, Nov./Dec. 2016. otwiera się w nowej karcie
- Po-Ching Lin, Ying-Dar Lin, Yuan-Cheng Lai, and Tsern-Huei Lee, "Using String Matching for Deep Packet Inspection," Computer, vol. 41, 4, pp. 23−28, April 2008. otwiera się w nowej karcie
- Rasmussen E.: Games and Information: An Introduction to Game Theory, 3rd ed. Blackwell Publishers. 2001. otwiera się w nowej karcie
- P. L. Bartlett. Online Prediction. http://stat.berkeley.edu/~bartlett/ papers/b-ol-16.pdf. 2015.
- A. Josang, R. Ismail, and C. Boyd, "A survey of trust and reputation systems for online service provision," Decision Support Systems, vol. 43, 2, pp. 618−644, March 2007. otwiera się w nowej karcie
- Q. Liu, "Information acquisition and reputation dynamics," Review of Economic Studies, vol. 78, no. 4, pp. 1400-1425, 2011. otwiera się w nowej karcie
- K. Hoffman, D. Zage, and C. Nita-Rotaru, "A survey of attack and defense techniques for reputation systems," ACM Computing Surveys, vol. 42, 1, Dec. 2009. otwiera się w nowej karcie
- Y. Chae, L. C. DiPippo, and Y. L. Sun, "Trust management for defending on-off attacks," IEEE Transactions on Parallel and Distributed Systems, vol. 26, 4, pp. 1178−1191, April 2015. otwiera się w nowej karcie
- M. H. Cheung, A. H. Mohsenian-Rad, V. W. Wong, and R. Schober, "Random access protocols for WLANs based on mechanism design," Proc. IEEE Int. Conf. on Comm. ICC'09, Dresden, Germany, June 2009. otwiera się w nowej karcie
- S. H. Nguyen, L. L. Andrew, and H. L. Vu, "Service differentiation without prioritization in IEEE 802.11 WLANs," Proc. 36th IEEE Conf. on Local Computer Networks (LCN), Bonn, Germany, Oct 2011. otwiera się w nowej karcie
- L. Galluccio, "A game-theoretic approach to prioritized transmission in wireless CSMA/CA networks," Proc. 69th IEEE Vehicular Technology Conf., Barcelona, Spain, April 2009. otwiera się w nowej karcie
- M. Li and B. Prabhakaran, "MAC layer admission control and priority re-allocation for handling QoS guarantees in non-cooperative wireless LANs," Springer Mobile Networks and Applications, vol. 10, 6, pp. 947-959, Dec. 2005. otwiera się w nowej karcie
- F. Hendrikx, K. Bubendorfer, and R. Chard, "Reputation systems: A survey and taxonomy," J. Parallel and Distrib. Comput., vol. 75, pp. 184-197, Jan. 2015. otwiera się w nowej karcie
- Y. L. Sun and Y. Liu, "Security of online reputation systems: The evolution of attacks and defenses," IEEE Signal Proc. Mag., vol. 29, 2, pp. 87−97, March 2012.
- R. Kerr and R. Cohen, "Smart cheaters do prosper: Defeating trust and reputation systems," Proc. AAMS'09, Budapest, Hungary, May 2009. otwiera się w nowej karcie
- Y. Freund, M. Kearns, Y. Mansour, D. Ron, R. Rubinfeld, and R. E. Schapire, "Efficient Algorithms for Learning to Play Repeated Games Against Computationally Bounded Adversaries," Proc. 36th Annual Symp. Foundations of Computer Science, Milwaukee WI, Nov. 1995. otwiera się w nowej karcie
- A. Patcha and Jung-Min Park, "A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks," Int. J. of Network Security, vol. 2, 2, pp.131-137, March 2006. otwiera się w nowej karcie
- Intel Corporation, "Delivering 160Gbps DPI performance on the Intel ® Xeon ® processor E5-2600 series using HyperScan," solution white paper, 2013. otwiera się w nowej karcie
- Weryfikacja:
- Politechnika Gdańska
wyświetlono 89 razy