• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations | Disambiguate

Brief announcement: Sustaining collaboration in multicast despite rational collusion (0)

by H Yu, P B Gibbons, C Shi
Venue:In PODC 2011
Add To MetaCart

Tools

Sorted by:
Results 1 - 2 of 2

79 Sybil Defenses via Social Networks: A Tutorial and Survey

by Idit Keidar, Haifeng Yu
"... We open the new academic year with Haifeng Yu’s article on overcoming sybil attacks using social networks. In a sybil attack, a malicious user assumes multiple identities, and uses them to pose as multiple users. Sybil attacks are a threat of the new millennium – they arise in Internet-based distrib ..."
Abstract - Cited by 26 (0 self) - Add to MetaCart
We open the new academic year with Haifeng Yu’s article on overcoming sybil attacks using social networks. In a sybil attack, a malicious user assumes multiple identities, and uses them to pose as multiple users. Sybil attacks are a threat of the new millennium – they arise in Internet-based distributed systems with a dynamic user population. Indeed, such attacks were not a concern in traditional distributed systems, where the set of participating processes was statically pre-defined. Sybil attacks are inherently difficult to deal with in systems where users do not wish to disclose binding private information, like credit card numbers. A recent popular approach for overcoming sybil attacks is using social networks. Intuitively, even if a malicious user can create many identities, he will have a hard time getting many honest users to befriend all of them in a social network. Thus, the graph structure of a social network can assist in revealing sybil nodes. In this column, Haifeng Yu presents a tutorial on how social networks can be leveraged to defend against sybil attacks, and a survey of recent suggestions employing this approach. Though Haifeng tackles the problem from a theoretical standpoint, (proving formal bounds etc.), this direction has garnered more attention from the systems community, perhaps because sybil attacks are perceived as a real threat for which social networks can provide a viable solution. Yet it appears that much theory for sybil defense using social networks
(Show Context)

Citation Context

...roach offers provable guarantees under certain assumption on the network position of the attacker. • DSybil [31] uses user feedbacks to defend against sybil attacks in recommendation systems. • DCast =-=[29]-=- uses pairwise entry fees to defend against sybil attacks in overlay multicast with rational players. • Danezis et al. [7] propose exploiting the bootstrap tree of the DHT for defending against sybil ...

What’s a Little Collusion Between Friends?

by Edmund L. Wong, Lorenzo Alvisi , 2013
"... This paper proposes a fundamentally different approach to addressing the challenge posed by colluding nodes to the sustainability of cooperative services. Departing from previous work that tries to address the threat by disincentivizing collusion or by modeling colluding nodes as faulty, this paper ..."
Abstract - Add to MetaCart
This paper proposes a fundamentally different approach to addressing the challenge posed by colluding nodes to the sustainability of cooperative services. Departing from previous work that tries to address the threat by disincentivizing collusion or by modeling colluding nodes as faulty, this paper describes two new notions of equilibrium, k-indistinguishability and k-stability, that allow coalitions to leverage their associations without harming the stability of the service. 1
(Show Context)

Citation Context

...lluding provides minimal benefit, which is likely to be true only in limited cases (Section 3). In general, using approximate best responses is largely complementary to our approach. Similarly, DCast =-=[37, 38]-=- is an overlay multicast mechanism that guarantees some baseline utility to nodes that follow the protocol, even if other nodes may collude. However, DCast is not proven to be an equilibrium, so it pr...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University