Securing internet coordinate embedding systems
نویسندگان
چکیده
منابع مشابه
Securing Internet Coordinate System: Embedding Phase
This paper addresses the issue of the security of Internet Coordinate Systems, by proposing a general method for malicious behavior detection during coordinate computations. We first show that the dynamics of a node, in a coordinate system without abnormal or malicious behavior, can be modeled by a Linear State Space model and tracked by a Kalman filter. Then we show, that the obtained model ca...
متن کاملSecuring Internet Coordinates Systems
Internet coordinate-based systems allow easy network positioning. In such systems, the basic idea is that if network distances between Internet nodes can be embedded in an appropriate space, unmeasured distances can be estimated using a simple distance computation in that space. Recently, these coordinates-based systems have been shown to be accurate, with very low distance prediction error. Ho...
متن کاملVeracity: a fully decentralized service for securing network coordinate systems
Decentralized logical coordinate systems have been proposed as a means of estimating network distances. These systems have widespread usage in p2p networks, ranging from neighbor selection to replica placement. Unfortunately, these systems are vulnerable to even a small number of malicious nodes lying about their coordinates or measurements. In this paper, we introduce Veracity, a fully decentr...
متن کاملSKIP-securing the Internet
Currently, two different approaches are being pursued for securing the Internet with respect to commercial use on a broad scale. The properties of these two approaches – application coupled security vs. network coupled security – will be discussed and compared. We will then focus on SKIP as an example for network coupled security, and show how it can be used to provide easily upgradable ‘plug &...
متن کاملSecuring Next Generation Internet Services
First Generation Internet was the data communication protocol for researchers – it was born on 1969 with RFC1 (Crocker S. 1969) which was entitled “Host Software” and dealt with Interface Message Processor (IMP) and Host-to-Host protocols. The IMP was the packet-switching node used to interconnect participant networks to the ARPANET from the late 1960s to 1989. IMP was the first generation of g...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM SIGCOMM Computer Communication Review
سال: 2007
ISSN: 0146-4833
DOI: 10.1145/1282427.1282388