Reference : Exploiting the Hard-wired Vulnerabilities of Newscast via Connectivity-splitting Attack
Scientific congresses, symposiums and conference proceedings : Paper published in a book
Engineering, computing & technology : Computer science
http://hdl.handle.net/10993/17007
Exploiting the Hard-wired Vulnerabilities of Newscast via Connectivity-splitting Attack
English
Muszynski, Jakub mailto [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) >]
Varrette, Sébastien mailto [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)]
Jimenez Laredo, Juan Luis mailto [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) >]
Bouvry, Pascal mailto [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)]
Oct-2014
Proc. of the IEEE Intl. Conf. on Network and System Security (NSS 2014)
Springer Verlag
LNCS
Yes
International
Xi'an
China
Intl. Conf. on Network and System Security (NSS 2014)
10-2014
[en] Newscast ; Fault Tolerance ; Peer-to-Peer
[en] Newscast is a model for information dissemination and mem- bership management in large-scale, agent-based distributed systems. It deploys a simple, peer-to-peer data exchange protocol. The Newscast pro- tocol forms an overlay network and keeps it connected by means of an epidemic algorithm, thus featuring a complex, spatially structured, and dynamically changing environment. It has recently become very popu- lar due to its inherent resilience to node volatility as it exhibits strong self-healing properties. In this paper, we analyze the robustness of the Newscast model when executed in a distributed environment subjected to malicious acts. More precisely, we evaluate the resilience of Newscast against cheating faults and demonstrate that even a few naive cheaters are able to defeat the protocol by breaking the network connectivity. Concrete experiments are performed using a framework that implements both the protocol and the cheating model considered in this work.
University of Luxembourg: High Performance Computing - ULHPC
http://hdl.handle.net/10993/17007

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Limited access
nss2014.pdfAuthor preprint1.12 MBRequest a copy

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.