Abstract
For peer-to-peer services to be effective, participating nodes must cooperate, but in most scenarios a node represents a self-interested party and cooperation can neither be expected nor enforced. A reasonable assumption is that a large fraction of p2p nodes are rational and will attempt to maximize their consumption of system resources while minimizing the use of their own. If such behavior violates system policy then it constitutes an attack. In this paper we identify and create a taxonomy for rational attacks and then identify corresponding solutions if they exist. The most effective solutions directly incentivize cooperative behavior, but when this is not feasible the common alternative is to incentivize evidence of cooperation instead.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Shneidman, J., Parkes, D.C.: Specification faithfulness in networks with rational nodes. In: Proc. 23rd ACM Symp. on Principles of Distributed Computing (PODC 2004), St. John’s, Canada (2004)
Shneidman, J., Parkes, D.C., Massoulie, L.: Faithfulness in internet algorithms. In: Proc. SIGCOMM Workshop on Practice and Theory of Incentives and Game Theory in Networked Systems (PINS 2004), Portland, OR, USA (2004)
Cohen, B.: Incentives build robustness in BitTorrent. In: 1st Internation Workshop on Economics of P2P Systems (2003)
Shneidman, J., Parkes, D.: Rationality and self-interest in peer to peer networks. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol. 2735. Springer, Heidelberg (2003)
Castro, M., Druschel, P., Ganesh, A., Rowstron, A., Wallach, D.S.: Secure routing for structured peer-to-peer overlay networks. In: Proceedings of Operating System Design and Implementation, Boston, MA (2002)
Glassman, S., Manasse, M., Abadi, M., Gauthier, P., Sobalvarro, P.: The millicent protocol for inexpensive electronic commerce. In: World Wide Web Journal, Fourth International World Wide Web Conference Proceedings, vol. 1, pp. 603–618 (1996)
Roussopoulos, M., Baker, M., Rosenthal, D.S.H.: 2 p2p or not 2 p2p? In: Voelker, G.M., Shenker, S. (eds.) IPTPS 2004. LNCS, vol. 3279, pp. 33–43. Springer, Heidelberg (2004)
Axelrod, R., Hamilton, W.D.: The evolution of cooperation. Science 211, 1390–1396 (1981)
Douceur, J.R.: The Sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 251. Springer, Heidelberg (2002)
Microsoft Corporation: Microsoft “Palladium”: A business overview (2002), http://www.microsoft.com/presspass/features/2002/jul02/0724palladiumwp.asp
TCPA: Building a foundation of trust in the PC. Technical report, Trusted Computing Platform Alliance (2000)
Anderson, R.: ’Trusted Computing’ frequently asked questions (2003), http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html
Cox, L.P., Noble, B.D.: Samsara: Honor among thieves in peer-to-peer storage. In: SOSP 2003: Proc. of the Nineteenth ACM Symposium on Operating Systems Principles, pp. 120–132. ACM Press, New York (2003)
Waldman, M., Mazieres, D.: Tangler: a censorship-resistant publishing system based on document entanglements. In: Proc. of the 8th ACM Conference on Computer and Communications Security, pp. 126–135. ACM Press, New York (2001)
Friedman, E.J., Resnick, P.: The social cost of cheap pseudonyms. Journal of Economics & Management Strategy 10, 173–199 (2001)
Fuqua, A.C., Ngan, T.W.J., Wallach, D.S.: Economic behavior of peer-to-peer storage networks. In: Workshop on Economics of Peer-to-Peer Systems, Berkeley, CA (2003)
Arbaugh, W.A., Farber, D.J., Smith, J.M.: A secure and reliable bootstrap architecture. In: Proc. of the 1997 IEEE Symposium on Security and Privacy, San Diego, CA, USA, p. 65. IEEE Computer Society, Los Alamitos (1997)
Ngan, T.W.J., Wallach, D.S., Druschel, P.: Incentives-compatible peer-to-peer multicast. In: 2nd Workshop on the Economics of Peer-to-Peer Systems, Cambridge, MA (2004)
Ngan, T.W.J., Nandi, A., Singh, A., Wallach, D.S., Druschel, P.: On designing incentives-compatible peer-to-peer systems. In: 2nd Bertinoro Workshop on Future Directions in Distributed Computing (FuDiCo II: S.O.S.), Bertinoro, Italy (2004)
Ngan, T.W.J., Wallach, D.S., Druschel, P.: Enforcing fair sharing of peer-to-peer resources. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol. 2735, pp. 149–159. Springer, Heidelberg (2003)
Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in p2p networks. In: Proc. of the Twelfth International Conference on World Wide Web, pp. 640–651 (2003)
Maniatis, P., Baker, M.: Secure history preservation through timeline entanglement. In: Proc. of the 11th USENIX Security Symposium, USENIX Association, pp. 297–312 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Nielson, S.J., Crosby, S.A., Wallach, D.S. (2005). A Taxonomy of Rational Attacks. In: Castro, M., van Renesse, R. (eds) Peer-to-Peer Systems IV. IPTPS 2005. Lecture Notes in Computer Science, vol 3640. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11558989_4
Download citation
DOI: https://doi.org/10.1007/11558989_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29068-1
Online ISBN: 978-3-540-31906-1
eBook Packages: Computer ScienceComputer Science (R0)