ANALYSIS OF DEFENSE AND ATTACK METHODS IN DISTRIBUTED SYSTEMS
Keywords:
distributed systems, information security, Sybil attack, Eclipse attack, admission control, routingAbstract
The work is devoted to the analysis of vulnerabilities in distributed systems and the classification of attack methods against them. The main threat levels are considered: from admission control and data transportation to complex collusion attacks, such as Sybil and Eclipse attacks. Defense methods including authentication mechanisms, secure storage, and secure routing are described.
References
Douceur J. R. The Sybil Attack. Peer-to-Peer Systems. IPTPS 2002. Lecture Notes in Computer Science. 2002. Vol 2429. P. 251–260. URL: https://doi.org/10.1007/3-540-45748-8_24.
Heilman E., Kendler A., Zohar A., Goldberg S. Eclipse Attacks on Bitcoin’s Peer-to-Peer Network. 24th USENIX Security Symposium. 2015. P. 129–144.
Feldman M., Papadimitriou C., Chuang J., Stoica I. Free-riding and whitewashing in peer-to-peer systems. IEEE Journal on Selected Areas in Communications. 2006. Vol. 24, no. 5. P. 1010–1019.
Coulouris G., Dollimore J., Kindberg T., Blair G. Distributed Systems: Concepts and Design. 5th Edition. Addison-Wesley, 2011. 1063 p.
Hu Y. C., Perrig A., Johnson D. B. Rushing Attacks and Defense Strategies in Wireless Ad Hoc Network Routing. WiSe ’03. 2003. P. 30–40.