已收录 273455 条政策
 政策提纲
  • 暂无提纲
The Eclipse attack
[摘要] Overlay networks are widely used to deploy functionality at edge nodes without changing network routers. Each node in an overlay network maintains pointers to a set of neighbor nodes. These pointers are used both to maintain the overlay and to implement application functionality. If an attacker controls a large fraction of the neighbors of correct nodes, it can ;;eclipse;; correct nodes and prevent correct overlay operation. Even if the attacker controls only a small fraction of the overlay nodes, it may be able to launch the Eclipse attack by manipulating the overlay maintenance algorithm.This thesis discusses the impact of Eclipse attack on several type of overlays and presents the design, implementation and evaluation of a new defense that can be applied to any overlay. Additionally, the proposed defense enables secure implementations of overlay optimizations that choose neighbors according to metrics like proximity or node capacity.
[发布日期]  [发布机构] Rice University
[效力级别] science [学科分类] 
[关键词]  [时效性] 
   浏览次数:3      统一登录查看全文      激活码登录查看全文