TY - GEN
T1 - The Frog-Boiling attack
T2 - 5th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2009
AU - Chan-Tin, Eric
AU - Feldman, Daniel
AU - Hopper, Nicholas
AU - Kim, Yongdae
N1 - Copyright:
Copyright 2013 Elsevier B.V., All rights reserved.
PY - 2009
Y1 - 2009
N2 - A network coordinate system assigns Euclidean "virtual" coordinates to every node in a network to allow easy estimation of network latency between pairs of nodes that have never contacted each other. These systems have been implemented in a variety of applications, most notably the popular Azureus/Vuze BitTorrent client. Zage and Nita-Rotaru (CCS 2007) and independently, Kaafar et al. (SIGCOMM 2007), demonstrated that several widely-cited network coordinate systems are prone to simple attacks, and proposed mechanisms to defeat these attacks using outlier detection to filter out adversarial inputs. We propose a new attack, Frog-Boiling, that defeats anomaly-detection based defenses in the context of network coordinate systems, and demonstrate empirically that Frog-Boiling is more disruptive than the previously known attacks. Our results suggest that a new approach is needed to solve this problem: outlier detection alone cannot be used to secure network coordinate systems.
AB - A network coordinate system assigns Euclidean "virtual" coordinates to every node in a network to allow easy estimation of network latency between pairs of nodes that have never contacted each other. These systems have been implemented in a variety of applications, most notably the popular Azureus/Vuze BitTorrent client. Zage and Nita-Rotaru (CCS 2007) and independently, Kaafar et al. (SIGCOMM 2007), demonstrated that several widely-cited network coordinate systems are prone to simple attacks, and proposed mechanisms to defeat these attacks using outlier detection to filter out adversarial inputs. We propose a new attack, Frog-Boiling, that defeats anomaly-detection based defenses in the context of network coordinate systems, and demonstrate empirically that Frog-Boiling is more disruptive than the previously known attacks. Our results suggest that a new approach is needed to solve this problem: outlier detection alone cannot be used to secure network coordinate systems.
KW - Anomaly detection
KW - Network coordinate systems
KW - Vivaldi
UR - http://www.scopus.com/inward/record.url?scp=84857258999&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84857258999&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-05284-2_26
DO - 10.1007/978-3-642-05284-2_26
M3 - Conference contribution
AN - SCOPUS:84857258999
SN - 3642052835
SN - 9783642052835
T3 - Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
SP - 448
EP - 458
BT - Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Revised Selected Papers
Y2 - 14 September 2009 through 18 September 2009
ER -