Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
}
TY - GEN
T1 - Real Attacks on Virtual Routers: Vivaldi out of Tune
AU - Mathy, L.
AU - Kaafar, M.A.
AU - Turletti, T.
AU - Dabbous, W.
PY - 2006/9
Y1 - 2006/9
N2 - The recently proposed coordinates-based systems for network positioning have been shown to be accurate, with very low distance prediction error. However, these systems often rely on nodes coordination and assume that information reported by probed nodes is correct. In this paper, we identify different attacks against coordinates embedding systems and study the impact of such attacks on the recently proposed Vivaldi decentralized positioning system. We present a simulation study of attacks carried out by malicious nodes that provide biased coordinates information and delay measurement probes. We experiment with attack strategies that aim to (i) introduce disorder in the system, (ii) fool honest nodes to move far away from their correct positions and (iii) isolate a particular node in the system through collusion. Our findings confirm the susceptibility of the Vivaldi System to such attacks.
AB - The recently proposed coordinates-based systems for network positioning have been shown to be accurate, with very low distance prediction error. However, these systems often rely on nodes coordination and assume that information reported by probed nodes is correct. In this paper, we identify different attacks against coordinates embedding systems and study the impact of such attacks on the recently proposed Vivaldi decentralized positioning system. We present a simulation study of attacks carried out by malicious nodes that provide biased coordinates information and delay measurement probes. We experiment with attack strategies that aim to (i) introduce disorder in the system, (ii) fool honest nodes to move far away from their correct positions and (iii) isolate a particular node in the system through collusion. Our findings confirm the susceptibility of the Vivaldi System to such attacks.
KW - cs_eprint_id
KW - 1314 cs_uid
KW - 1
U2 - 10.1145/1162666.1162672
DO - 10.1145/1162666.1162672
M3 - Conference contribution/Paper
SP - 139
EP - 146
BT - LSAD '06 Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense
T2 - ACM SIGCOMM Workshop
Y2 - 1 January 1900
ER -