The Frog-Boiling attack: Limitations of secure network coordinate systems

Eric Chan-Tin, Victor Heorhiadi, Nick Hopper, Yongdae Kim

Research output: Contribution to journalArticlepeer-review

25 Scopus citations

Abstract

A network coordinate system assigns Euclidean "virtual" coordinates to every node in a network to allow easy estimation of network latency between pairs of nodes that have never contacted each other. These systems have been implemented in a variety of applications, most notably the popular Vuze BitTorrent client. Zage and Nita-Rotaru (at CCS 2007) and independently, Kaafar et al. (at SIGCOMM 2007), demonstrated that several widely-cited network coordinate systems are prone to simple attacks, and proposed mechanisms to defeat these attacks using outlier detection to filter out adversarial inputs. Kaafar et al. goes a step further and requires that a fraction of the network is trusted. More recently, Sherr et al. (at USENIX ATC 2009) proposed Veracity, a distributed reputation system to secure network coordinate systems. We describe a new attack on network coordinate systems, Frog-Boiling, that defeats all of these defenses. Thus, even a system with trusted entities is still vulnerable to attacks. Moreover, having witnesses vouch for your coordinates as in Veracity does not prevent our attack. Finally, we demonstrate empirically that the Frog-Boiling attack is more disruptive than the previously known attacks: systems that attempt to reject "bad" inputs by statistical means or reputation cannot be used to secure a network coordinate system.

Original languageEnglish (US)
Article number27
JournalACM Transactions on Information and System Security
Volume14
Issue number3
DOIs
StatePublished - Nov 2011

Keywords

  • Attack
  • Network coordinate
  • Secure

Fingerprint

Dive into the research topics of 'The Frog-Boiling attack: Limitations of secure network coordinate systems'. Together they form a unique fingerprint.

Cite this