首页> 外文会议>2012 Fourth International Conference on Communication Systems and Networks >On detecting malicious behaviors in interactive networks: Algorithms and analysis
【24h】

On detecting malicious behaviors in interactive networks: Algorithms and analysis

机译:关于检测交互式网络中的恶意行为:算法和分析

获取原文
获取原文并翻译 | 示例
获取外文期刊封面目录资料

摘要

Interactive networks are vulnerable to various attacks due to the existence of malicious nodes which do not comply with the network protocol so as to achieve their own purposes. For example, in a peer-to-peer (P2P) streaming system, since each peer needs to participate in uploading data to other peers, malicious peers may choose to upload bogus data so as to damage the playback and degrade the watching experience of normal peers in the system. This is known as pollution attack in P2P networks, and it can cause severe impact to the performance of P2P streaming systems. Other examples include pollution attack in wireless mesh networks (WMNs) where malicious nodes forward modified and polluted packets to other nodes, and the shill attack in online social networks (OSNs) where malicious users give wrong recommendations to others so as to mislead their purchases. In this paper, we propose a general and fully distributed detection framework which can be executed by each legitimate node in an interactive network to identify its malicious neighbors. To illustrate the effectiveness and the efficiency of our detection framework, we apply it to three realistic applications: P2P streaming networks, WMNs and OSNs, and show how to defend against the attacks launched by malicious nodes. We also quantify the performance of our detection algorithms and validate our analysis via extensive simulations.
机译:交互式网络由于存在不符合网络协议以实现其自身目的的恶意节点而容易受到各种攻击。例如,在点对点(P2P)流系统中,由于每个对等点都需要参与向其他对等点上传数据,因此恶意对等点可能会选择上传虚假数据,从而破坏播放并降低正常人的观看体验系统中的同伴。这在P2P网络中称为污染攻击,并且可能对P2P流系统的性能造成严重影响。其他示例包括无线网状网络(WMN)中的污染攻击,其中恶意节点将经过修改和污染的数据包转发到其他节点,以及在线社交网络(OSN)中的诈骗攻击,其中恶意用户向他人提供错误建议以误导他们的购买。在本文中,我们提出了一种通用且完全分布式的检测框架,该框架可以由交互式网络中的每个合法节点执行以识别其恶意邻居。为了说明检测框架的有效性和效率,我们将其应用于三个实际应用程序:P2P流网络,WMN和OSN,并展示了如何防御恶意节点发起的攻击。我们还将量化检测算法的性能,并通过广泛的仿真验证我们的分析。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号