The Frog-Boiling attack: Limitations of anomaly detection for secure network coordinate systems

Eric Chan-Tin, Daniel Feldman, Nicholas Hopper, Yongdae Kim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Scopus citations

Abstract

A network coordinate system assigns Euclidean "virtual" coordinates to every node in a network to allow easy estimation of network latency between pairs of nodes that have never contacted each other. These systems have been implemented in a variety of applications, most notably the popular Azureus/Vuze BitTorrent client. Zage and Nita-Rotaru (CCS 2007) and independently, Kaafar et al. (SIGCOMM 2007), demonstrated that several widely-cited network coordinate systems are prone to simple attacks, and proposed mechanisms to defeat these attacks using outlier detection to filter out adversarial inputs. We propose a new attack, Frog-Boiling, that defeats anomaly-detection based defenses in the context of network coordinate systems, and demonstrate empirically that Frog-Boiling is more disruptive than the previously known attacks. Our results suggest that a new approach is needed to solve this problem: outlier detection alone cannot be used to secure network coordinate systems.

Original languageEnglish (US)
Title of host publicationSecurity and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Revised Selected Papers
Pages448-458
Number of pages11
DOIs
StatePublished - 2009
Event5th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2009 - Athens, Greece
Duration: Sep 14 2009Sep 18 2009

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
Volume19 LNICST
ISSN (Print)1867-8211

Other

Other5th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2009
Country/TerritoryGreece
CityAthens
Period9/14/099/18/09

Keywords

  • Anomaly detection
  • Network coordinate systems
  • Vivaldi

Fingerprint

Dive into the research topics of 'The Frog-Boiling attack: Limitations of anomaly detection for secure network coordinate systems'. Together they form a unique fingerprint.

Cite this