Dependability Evaluation of Cluster-based Systems

作者: Frédéric Tronel , Bruno Sericola , Romaric Ludinard , Emmanuelle Anceaume , Francisco Brasileiro

DOI:

关键词:

摘要: Awerbuch and Scheideler have shown that peer-to-peer overlays networks can survive Byzantine attacks only if malicious nodes are not able to predict what will be the topology of network for a given sequence join leave operations. In this paper we investigate adversarial strategies by following specific protocols. Our analysis demonstrates first an adversary very quickly subvert distributed hash tables based simply never triggering We then show when all (honest ones) imposed on limited lifetime, system eventually reaches stationary regime where ratio polluted clusters is bounded, independently from initial amount corruption in system.

参考文章(24)
Emil Sit, Robert Morris, None, Security Considerations for Peer-to-Peer Distributed Hash Tables international workshop on peer to peer systems. pp. 261- 269 ,(2002) , 10.1007/3-540-45748-8_25
John R. Douceur, The Sybil Attack international workshop on peer to peer systems. pp. 251- 260 ,(2002) , 10.1007/3-540-45748-8_24
M. Srivatsa, Ling Liu, Vulnerabilities and security threats in structured overlay networks: a quantitative analysis annual computer security applications conference. pp. 252- 261 ,(2004) , 10.1109/CSAC.2004.50
Amos Fiat, Jared Saia, Maxwell Young, Making Chord Robust to Byzantine Attacks Algorithms – ESA 2005. pp. 803- 814 ,(2005) , 10.1007/11561071_71
Baruch Awerbuch, Christian Scheideler, Group Spreading: A Protocol for Provably Secure Distributed Name Service Automata, Languages and Programming. ,vol. 3142, pp. 183- 195 ,(2004) , 10.1007/978-3-540-27836-8_18
Danny Dolev, Ezra N. Hoch, Robbert van Renesse, Self-stabilizing and Byzantine-Tolerant Overlay Network Lecture Notes in Computer Science. pp. 343- 357 ,(2007) , 10.1007/978-3-540-77096-1_25
P. Druschel, A. Rowstron, PAST: a large-scale, persistent peer-to-peer storage utility Proceedings Eighth Workshop on Hot Topics in Operating Systems. pp. 75- 80 ,(2001) , 10.1109/HOTOS.2001.990064
C. Greg Plaxton, Rajmohan Rajaraman, Andréa W. Richa, Accessing nearby copies of replicated objects in a distributed environment acm symposium on parallel algorithms and architectures. pp. 311- 320 ,(1997) , 10.1145/258492.258523
Gerardo Rubino, Bruno Sericola, Sojourn times in finite Markov processes Journal of Applied Probability. ,vol. 26, pp. 744- 756 ,(1989) , 10.2307/3214379
Ingmar Baumgart, Sebastian Mies, S/Kademlia: A practicable approach towards secure key-based routing international conference on parallel and distributed systems. ,vol. 2, pp. 1- 8 ,(2007) , 10.1109/ICPADS.2007.4447808