2012 ACM/IEEE/SCS 26th Workshop on Principles of Advanced and Distributed Simulation 2012
DOI: 10.1109/pads.2012.24
|View full text |Cite
|
Sign up to set email alerts
|

Measuring Information Exposure Attacks on Interest Management

Abstract: Abstract-For a scalable Massively Multiplayer Online Game (MMOG), interest management (IM) is an essential component to reduce unnecessary network traffic. As Area-Of-Interest (AOI) defines each player's interests, an entity normally maintains a subscriber list of players whose AOIs cover the position of the entity. To maintain the subscriber list, players are required to send AOI updates. Unfortunately, AOI update is vulnerable to information exposure (IE) attack especially on P2P infrastructure. Sensitive in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2014
2014
2015
2015

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…Moreover, the loss function of Adaboost will be modified to consider the classification costs. Moreover, we will also investigate the application of the proposed algorithm to information security [41,43,53,42,41,52,18], bioinformatics [40,24,57], medial imaging [56,55,54], computer vision [38,23,22,36,37,19,17,46,44,45,15], reinforcement learning [27,28], cloud computing [50,51] and microprocessor reliability modeling [8,6,7,5,59,61,60].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, the loss function of Adaboost will be modified to consider the classification costs. Moreover, we will also investigate the application of the proposed algorithm to information security [41,43,53,42,41,52,18], bioinformatics [40,24,57], medial imaging [56,55,54], computer vision [38,23,22,36,37,19,17,46,44,45,15], reinforcement learning [27,28], cloud computing [50,51] and microprocessor reliability modeling [8,6,7,5,59,61,60].…”
Section: Discussionmentioning
confidence: 99%
“…The algorithm takes an initial classifier f (x) as an input, and operates on a iterative way. In each iteration, one new training sample is input to update the classifier adaptation function parameter, based on the updating rules in ( 15) - (17), and (18).…”
Section: Algorithmmentioning
confidence: 99%
“…Although the official game client does not show the HP values on the screen, the player may still use third-party programs to access such information, thus gaining an unfair advantage. A quantitative analysis of information exposure attacks on interest management can be found in Hao and Cai [2012].…”
Section: Filtering Precisionmentioning
confidence: 99%