Securing internet coordinate embedding systems

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing Internet Coordinate System: Embedding Phase

This paper addresses the issue of the security of Internet Coordinate Systems, by proposing a general method for malicious behavior detection during coordinate computations. We first show that the dynamics of a node, in a coordinate system without abnormal or malicious behavior, can be modeled by a Linear State Space model and tracked by a Kalman filter. Then we show, that the obtained model ca...

متن کامل

Securing Internet Coordinates Systems

Internet coordinate-based systems allow easy network positioning. In such systems, the basic idea is that if network distances between Internet nodes can be embedded in an appropriate space, unmeasured distances can be estimated using a simple distance computation in that space. Recently, these coordinates-based systems have been shown to be accurate, with very low distance prediction error. Ho...

متن کامل

Veracity: a fully decentralized service for securing network coordinate systems

Decentralized logical coordinate systems have been proposed as a means of estimating network distances. These systems have widespread usage in p2p networks, ranging from neighbor selection to replica placement. Unfortunately, these systems are vulnerable to even a small number of malicious nodes lying about their coordinates or measurements. In this paper, we introduce Veracity, a fully decentr...

متن کامل

SKIP-securing the Internet

Currently, two different approaches are being pursued for securing the Internet with respect to commercial use on a broad scale. The properties of these two approaches – application coupled security vs. network coupled security – will be discussed and compared. We will then focus on SKIP as an example for network coupled security, and show how it can be used to provide easily upgradable ‘plug &...

متن کامل

Securing Next Generation Internet Services

First Generation Internet was the data communication protocol for researchers – it was born on 1969 with RFC1 (Crocker S. 1969) which was entitled “Host Software” and dealt with Interface Message Processor (IMP) and Host-to-Host protocols. The IMP was the packet-switching node used to interconnect participant networks to the ARPANET from the late 1960s to 1989. IMP was the first generation of g...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM SIGCOMM Computer Communication Review

سال: 2007

ISSN: 0146-4833

DOI: 10.1145/1282427.1282388