Mina Guirguis, Joshua Tharp, Azer Bestavros, I. Matta
{"title":"内容适应机制对RoQ攻击的脆弱性评估","authors":"Mina Guirguis, Joshua Tharp, Azer Bestavros, I. Matta","doi":"10.1109/ICN.2009.40","DOIUrl":null,"url":null,"abstract":"Current computing systems employ different mechanisms to deal with overload conditions. Of those widely deployed are content adaptation mechanisms whereby the quality level of the content is adapted dynamically to mitigate overload conditions. Serving degraded content reduces strain on resources and enables them to cater for a larger set of clients. To that end, this paper studies adversarial exploits of dynamic content adaptation mechanisms to a new instantiation of Reduction of Quality (RoQ) attacks. The RoQ attack pattern is orchestrated to cause different forms of damage such as longer response time for legitimate clients, degraded content being served and underutilization of resources. We assess the impact of RoQ attacks via the potency metric which reflects the tradeoffs between the damage inflicted and the cost in mounting the attack. We validate our results through numerical analysis as well as real Internet experiments.","PeriodicalId":299215,"journal":{"name":"2009 Eighth International Conference on Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Assessment of Vulnerability of Content Adaptation Mechanisms to RoQ Attacks\",\"authors\":\"Mina Guirguis, Joshua Tharp, Azer Bestavros, I. Matta\",\"doi\":\"10.1109/ICN.2009.40\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Current computing systems employ different mechanisms to deal with overload conditions. Of those widely deployed are content adaptation mechanisms whereby the quality level of the content is adapted dynamically to mitigate overload conditions. Serving degraded content reduces strain on resources and enables them to cater for a larger set of clients. To that end, this paper studies adversarial exploits of dynamic content adaptation mechanisms to a new instantiation of Reduction of Quality (RoQ) attacks. The RoQ attack pattern is orchestrated to cause different forms of damage such as longer response time for legitimate clients, degraded content being served and underutilization of resources. We assess the impact of RoQ attacks via the potency metric which reflects the tradeoffs between the damage inflicted and the cost in mounting the attack. We validate our results through numerical analysis as well as real Internet experiments.\",\"PeriodicalId\":299215,\"journal\":{\"name\":\"2009 Eighth International Conference on Networks\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 Eighth International Conference on Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICN.2009.40\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Eighth International Conference on Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICN.2009.40","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Assessment of Vulnerability of Content Adaptation Mechanisms to RoQ Attacks
Current computing systems employ different mechanisms to deal with overload conditions. Of those widely deployed are content adaptation mechanisms whereby the quality level of the content is adapted dynamically to mitigate overload conditions. Serving degraded content reduces strain on resources and enables them to cater for a larger set of clients. To that end, this paper studies adversarial exploits of dynamic content adaptation mechanisms to a new instantiation of Reduction of Quality (RoQ) attacks. The RoQ attack pattern is orchestrated to cause different forms of damage such as longer response time for legitimate clients, degraded content being served and underutilization of resources. We assess the impact of RoQ attacks via the potency metric which reflects the tradeoffs between the damage inflicted and the cost in mounting the attack. We validate our results through numerical analysis as well as real Internet experiments.