ANALYSIS OF DEFENSE AND ATTACK METHODS IN DISTRIBUTED SYSTEMS

Authors

  • Mykyta Melenchukov National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute", Ukraine
  • Artem Volokyta National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute", Ukraine

Keywords:

distributed systems, information security, Sybil attack, Eclipse attack, admission control, routing

Abstract

The work is devoted to the analysis of vulnerabilities in distributed systems and the classification of attack methods against them. The main threat levels are considered: from admission control and data transportation to complex collusion attacks, such as Sybil and Eclipse attacks. Defense methods including authentication mechanisms, secure storage, and secure routing are described.

References

Douceur J. R. The Sybil Attack. Peer-to-Peer Systems. IPTPS 2002. Lecture Notes in Computer Science. 2002. Vol 2429. P. 251–260. URL: https://doi.org/10.1007/3-540-45748-8_24.

Heilman E., Kendler A., Zohar A., Goldberg S. Eclipse Attacks on Bitcoin’s Peer-to-Peer Network. 24th USENIX Security Symposium. 2015. P. 129–144.

Feldman M., Papadimitriou C., Chuang J., Stoica I. Free-riding and whitewashing in peer-to-peer systems. IEEE Journal on Selected Areas in Communications. 2006. Vol. 24, no. 5. P. 1010–1019.

Coulouris G., Dollimore J., Kindberg T., Blair G. Distributed Systems: Concepts and Design. 5th Edition. Addison-Wesley, 2011. 1063 p.

Hu Y. C., Perrig A., Johnson D. B. Rushing Attacks and Defense Strategies in Wireless Ad Hoc Network Routing. WiSe ’03. 2003. P. 30–40.

Downloads

Published

2023-06-08

Issue

Section

Security, Fault Tolerance (FT)