A denial-of-service resistant DHT

7Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We consider the problem of designing scalable and robust information systems based on multiple servers that can survive even massive denial-of-service (DoS) attacks. More precisely, we are focusing on designing a scalable distributed hash table (DHT) that is robust against so-called past insider attacks. In a past insider attack, an adversary knows everything about the system up to some time point to not known to the system. After to, the adversary can attack the system with a massive DoS attack in which it can block a constant fraction of the servers of its choice. Yet, the system should be able to survive such an attack in a sense that for any set of lookup requests, one per non-blocked (i.e., non-DoS attacked) server, every lookup request to a data item that was last updated after to can be served by the system, and processing all the requests just needs polylogarithmic time and work at every server. We show that such a system can be designed. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Awerbuch, B., & Scheideler, C. (2007). A denial-of-service resistant DHT. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4731 LNCS, pp. 33–47). Springer Verlag. https://doi.org/10.1007/978-3-540-75142-7_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free