2006
DOI: 10.1109/tdsc.2006.12
|View full text |Cite
|
Sign up to set email alerts
|

Exposing and Eliminating Vulnerabilities to Denial of Service Attacks in Secure Gossip-Based Multicast

Abstract: We propose a framework and methodology for quantifying the effect of denial of service (DoS) attacks on a distributed system. We present a systematic study of the resistance of gossip-based multicast protocols to DoS attacks. We show that even distributed and randomized gossip-based protocols, which eliminate single points of failure, do not necessarily eliminate vulnerabilities to DoS attacks. We propose Drum-a simple gossip-based multicast protocol that eliminates such vulnerabilities. Drum was implemented i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2007
2007
2019
2019

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 19 publications
(17 citation statements)
references
References 29 publications
0
17
0
Order By: Relevance
“…Group based multicast systems such as described in [12] attempt to address the problems that face mobile devices that are intermittently attached to a network by building a hierarchy as receivers join the multicast group. Servers are connected to other servers higher in the hierarchy, and eventually back to the source with delivery from servers to children through unicast reliable protocols.…”
Section: Related Workmentioning
confidence: 99%
“…Group based multicast systems such as described in [12] attempt to address the problems that face mobile devices that are intermittently attached to a network by building a hierarchy as receivers join the multicast group. Servers are connected to other servers higher in the hierarchy, and eventually back to the source with delivery from servers to children through unicast reliable protocols.…”
Section: Related Workmentioning
confidence: 99%
“…Badishi et al [4] proposed a gossip-based multicast protocol called Drum, which combines multiple techniques such as push, pull, random port selections, and resource bounds, for mitigating DoS attacks in secure gossip-based multicast. Wright et al [26] presented k-redundant depender graphs for distributing public-key certificate revocation lists (CRLs), which provides every node in the graph with k disjoint paths to the root of the graph, thus guaranteeing delivery even when up to kÀ1 paths between them have failed.…”
Section: Network Attacks and Countermeasuresmentioning
confidence: 99%
“…To estimate the probability that at least two choices fail, note that there are less than (a log(n)) 2 2 pairs of times during the procedure at which the choices can fail, and for each such pair the probability of failure in both is at most ( 2a log(n) n/2k 2 ) 2 (assuming as before the event in Lemma 3.1). The probability that at least two of the 2a log(n) choices are failures is therefore at most (a log(n)) 2 2…”
Section: Connectivitymentioning
confidence: 99%
“…Let A denote the event "G n r,c contains at least two distinct 1 8k 2 -giant components". Note that in view of Proposition 2 with the estimate s = 1 8k 2 (11) that comes out of its proof, the only thing that can cause (2) to go wrong is if there exists an ε > 0 such that…”
Section: Connectivitymentioning
confidence: 99%
See 1 more Smart Citation