A taxonomy of rational attacks

25Citations
Citations of this article
35Readers
Mendeley users who have this article in their library.
Get full text

Abstract

For peer-to-peer services to be effective, participating nodes must cooperate, but in most scenarios a node represents a self-interested party and cooperation can neither be expected nor enforced. A reasonable assumption is that a large fraction of p2p nodes are rational and will attempt to maximize their consumption of system resources while minimizing the use of their own. If such behavior violates system policy then it constitutes an attack. In this paper we identify and create a taxonomy for rational attacks and then identify corresponding solutions if they exist. The most effective solutions directly incentivize cooperative behavior, but when this is not feasible the common alternative is to incentivize evidence of cooperation instead. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Nielson, S. J., Crosby, S. A., & Wallach, D. S. (2005). A taxonomy of rational attacks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3640 LNCS, pp. 36–46). https://doi.org/10.1007/11558989_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free