Xiaohan Zhao, E. Lua, Yang Chen, Xiaoxiao Song, Beixing Deng, Xing Li
{"title":"Sniper: Social-Link Defense for Network Coordinate Systems","authors":"Xiaohan Zhao, E. Lua, Yang Chen, Xiaoxiao Song, Beixing Deng, Xing Li","doi":"10.1109/INFCOMW.2009.5072189","DOIUrl":null,"url":null,"abstract":"Recent work on securing the Network Coordinate (NC) service attempts to defend attacks based on nodes' past behavior and activities. They detect malicious nodes only after attacks occurred. In order to secure NC system before malicious nodes mount attacks, we propose a social-link defense system for NC service--Sniper. We are able to provide NC system with trusted neighbors (landmarks) using social-link filtering technique. Our preliminary results demonstrate that Sniper can protect NC system successfully before they are attacked by malicious nodes.","PeriodicalId":252414,"journal":{"name":"IEEE INFOCOM Workshops 2009","volume":"115 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE INFOCOM Workshops 2009","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INFCOMW.2009.5072189","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Recent work on securing the Network Coordinate (NC) service attempts to defend attacks based on nodes' past behavior and activities. They detect malicious nodes only after attacks occurred. In order to secure NC system before malicious nodes mount attacks, we propose a social-link defense system for NC service--Sniper. We are able to provide NC system with trusted neighbors (landmarks) using social-link filtering technique. Our preliminary results demonstrate that Sniper can protect NC system successfully before they are attacked by malicious nodes.