Skip to main content

A Taxonomy of Rational Attacks

  • Conference paper
Peer-to-Peer Systems IV (IPTPS 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3640))

Included in the following conference series:

Abstract

For peer-to-peer services to be effective, participating nodes must cooperate, but in most scenarios a node represents a self-interested party and cooperation can neither be expected nor enforced. A reasonable assumption is that a large fraction of p2p nodes are rational and will attempt to maximize their consumption of system resources while minimizing the use of their own. If such behavior violates system policy then it constitutes an attack. In this paper we identify and create a taxonomy for rational attacks and then identify corresponding solutions if they exist. The most effective solutions directly incentivize cooperative behavior, but when this is not feasible the common alternative is to incentivize evidence of cooperation instead.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Shneidman, J., Parkes, D.C.: Specification faithfulness in networks with rational nodes. In: Proc. 23rd ACM Symp. on Principles of Distributed Computing (PODC 2004), St. John’s, Canada (2004)

    Google Scholar 

  2. Shneidman, J., Parkes, D.C., Massoulie, L.: Faithfulness in internet algorithms. In: Proc. SIGCOMM Workshop on Practice and Theory of Incentives and Game Theory in Networked Systems (PINS 2004), Portland, OR, USA (2004)

    Google Scholar 

  3. Cohen, B.: Incentives build robustness in BitTorrent. In: 1st Internation Workshop on Economics of P2P Systems (2003)

    Google Scholar 

  4. Shneidman, J., Parkes, D.: Rationality and self-interest in peer to peer networks. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol. 2735. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  5. Castro, M., Druschel, P., Ganesh, A., Rowstron, A., Wallach, D.S.: Secure routing for structured peer-to-peer overlay networks. In: Proceedings of Operating System Design and Implementation, Boston, MA (2002)

    Google Scholar 

  6. Glassman, S., Manasse, M., Abadi, M., Gauthier, P., Sobalvarro, P.: The millicent protocol for inexpensive electronic commerce. In: World Wide Web Journal, Fourth International World Wide Web Conference Proceedings, vol. 1, pp. 603–618 (1996)

    Google Scholar 

  7. Roussopoulos, M., Baker, M., Rosenthal, D.S.H.: 2 p2p or not 2 p2p? In: Voelker, G.M., Shenker, S. (eds.) IPTPS 2004. LNCS, vol. 3279, pp. 33–43. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  8. Axelrod, R., Hamilton, W.D.: The evolution of cooperation. Science 211, 1390–1396 (1981)

    Article  MathSciNet  Google Scholar 

  9. Douceur, J.R.: The Sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 251. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  10. Microsoft Corporation: Microsoft “Palladium”: A business overview (2002), http://www.microsoft.com/presspass/features/2002/jul02/0724palladiumwp.asp

  11. TCPA: Building a foundation of trust in the PC. Technical report, Trusted Computing Platform Alliance (2000)

    Google Scholar 

  12. Anderson, R.: ’Trusted Computing’ frequently asked questions (2003), http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html

  13. Cox, L.P., Noble, B.D.: Samsara: Honor among thieves in peer-to-peer storage. In: SOSP 2003: Proc. of the Nineteenth ACM Symposium on Operating Systems Principles, pp. 120–132. ACM Press, New York (2003)

    Chapter  Google Scholar 

  14. Waldman, M., Mazieres, D.: Tangler: a censorship-resistant publishing system based on document entanglements. In: Proc. of the 8th ACM Conference on Computer and Communications Security, pp. 126–135. ACM Press, New York (2001)

    Chapter  Google Scholar 

  15. Friedman, E.J., Resnick, P.: The social cost of cheap pseudonyms. Journal of Economics & Management Strategy 10, 173–199 (2001)

    Article  Google Scholar 

  16. Fuqua, A.C., Ngan, T.W.J., Wallach, D.S.: Economic behavior of peer-to-peer storage networks. In: Workshop on Economics of Peer-to-Peer Systems, Berkeley, CA (2003)

    Google Scholar 

  17. Arbaugh, W.A., Farber, D.J., Smith, J.M.: A secure and reliable bootstrap architecture. In: Proc. of the 1997 IEEE Symposium on Security and Privacy, San Diego, CA, USA, p. 65. IEEE Computer Society, Los Alamitos (1997)

    Google Scholar 

  18. Ngan, T.W.J., Wallach, D.S., Druschel, P.: Incentives-compatible peer-to-peer multicast. In: 2nd Workshop on the Economics of Peer-to-Peer Systems, Cambridge, MA (2004)

    Google Scholar 

  19. Ngan, T.W.J., Nandi, A., Singh, A., Wallach, D.S., Druschel, P.: On designing incentives-compatible peer-to-peer systems. In: 2nd Bertinoro Workshop on Future Directions in Distributed Computing (FuDiCo II: S.O.S.), Bertinoro, Italy (2004)

    Google Scholar 

  20. Ngan, T.W.J., Wallach, D.S., Druschel, P.: Enforcing fair sharing of peer-to-peer resources. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol. 2735, pp. 149–159. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  21. Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in p2p networks. In: Proc. of the Twelfth International Conference on World Wide Web, pp. 640–651 (2003)

    Google Scholar 

  22. Maniatis, P., Baker, M.: Secure history preservation through timeline entanglement. In: Proc. of the 11th USENIX Security Symposium, USENIX Association, pp. 297–312 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Nielson, S.J., Crosby, S.A., Wallach, D.S. (2005). A Taxonomy of Rational Attacks. In: Castro, M., van Renesse, R. (eds) Peer-to-Peer Systems IV. IPTPS 2005. Lecture Notes in Computer Science, vol 3640. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11558989_4

Download citation

  • DOI: https://doi.org/10.1007/11558989_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29068-1

  • Online ISBN: 978-3-540-31906-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics