A taxonomy of rational attacks

被引:0
|
作者
Nielson, SJ [1 ]
Crosby, SA [1 ]
Wallach, DS [1 ]
机构
[1] Rice Univ, Dept Comp Sci, Houston, TX 77251 USA
来源
PEER-TO-PEER SYSTEMS IV | 2005年 / 3640卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
For peer-to-peer services to be effective, participating nodes must cooperate, but in most scenarios a node represents a self-interested party and cooperation can neither be expected nor enforced. A reasonable assumption is that a large fraction of p2p nodes are rational and will attempt to maximize their consumption of system resources while minimizing the use of their own. If such behavior violates system policy then it constitutes an attack. In this paper we identify and create a taxonomy for rational attacks and then identify corresponding solutions if they exist. The most effective solutions directly incentivize cooperative behavior, but when this is not feasible the common alternative is to incentivize evidence of cooperation instead.
引用
收藏
页码:36 / 46
页数:11
相关论文
共 50 条
  • [31] Breaking the Model: Finalisation and a Taxonomy of Security Attacks
    Clark, John A.
    Stepney, Susan
    Chivers, Howard
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 137 (02) : 225 - 242
  • [32] Rational Protocols and Attacks in Blockchain System
    Li, Tao
    Chen, Yuling
    Wang, Yanli
    Wang, Yilei
    Zhao, Minghao
    Zhu, Haojia
    Tian, Youliang
    Yu, Xiaomei
    Yang, Yixian
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [33] A Taxonomy of Technical Attribution Techniques for Cyber Attacks
    Nicholson, Andrew
    Watson, Tim
    Norris, Peter
    Duffy, Alistair
    Isbell, Roy
    PROCEEDINGS OF THE 11TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2012, : 188 - 197
  • [34] A taxonomy and survey of attacks against machine learning
    Pitropakis, Nikolaos
    Panaousis, Emmanouil
    Giannetsos, Thanassis
    Anastasiadis, Eleftherios
    Loukas, George
    COMPUTER SCIENCE REVIEW, 2019, 34
  • [35] TaxIdMA: Towards a Taxonomy for Attacks related to Identities
    Poehn, Daniela
    Hommel, Wolfgang
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
  • [36] A formalized taxonomy of DDoS attacks based on similarity
    Kang, Jian
    Zhang, Yuan
    Ju, Jiu-Bin
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3975 : 717 - 719
  • [37] A TAXONOMY OF ATTACKS ON THE DNP3 PROTOCOL
    East, Samuel
    Butts, Jonathan
    Papa, Mauricio
    Shenoi, Sujeet
    CRITICAL INFRASTRUCTURE PROTECTION III, 2009, 311 : 67 - 81
  • [38] Autonomous Vehicle Security: A Taxonomy of Attacks and Defences
    Thing, Vrizlynn L. L.
    Wu, Jiaxi
    2016 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2016, : 164 - 170
  • [39] TOWARDS A TAXONOMY OF CYBER ATTACKS ON SCADA SYSTEM
    Banga, Aashima
    Gupta, Deep A.
    Bathla, Ruchika
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 343 - 347
  • [40] Internet of Things (IoT): Taxonomy of Security Attacks
    Nawir, Mukrimah
    Amir, Amiza
    Yaakob, Naimah
    Lynn, Ong Bi
    2016 3RD INTERNATIONAL CONFERENCE ON ELECTRONIC DESIGN (ICED), 2016, : 321 - 326