首页 > 最新文献

24th International Conference on Distributed Computing Systems, 2004. Proceedings.最新文献

英文 中文
A study of BGP path vector route looping behavior BGP路径矢量路由循环行为的研究
Pub Date : 2004-03-24 DOI: 10.1109/ICDCS.2004.1281640
Dan Pei, Xiaoliang Zhao, D. Massey, Lixia Zhang
Measurements have shown evidences of inter-domain packet forwarding loops in the Internet, but the exact cause of these loops remains unclear. As one of the efforts in identifying the causes, this paper examines how transient loops can be created at the inter-domain level via BGP, and what are the major factors that contribute to duration of the routing loops. As a path-vector routing protocol, BGP messages list the entire AS path to each destination and the path information enables each node to detect, thus break, arbitrarily long routing loops involving itself. However, delays due to physical constrains and protocol mechanisms slow down routing updates propagation and the routing information inconsistencies among the nodes lead to loop formation during convergence. We show that the duration of transient BGP loops match closely to BGP's routing convergence time and the looping duration is linearly proportional to BGP's minimum route advertisement interval timer (MRAI) value. We also examine four BGP routing convergence enhancements and show that two enhancements effective in speeding up routing convergence are also effective in reducing routing loops.
测量显示了互联网中域间数据包转发环路的证据,但这些环路的确切原因尚不清楚。作为确定原因的努力之一,本文研究了如何通过BGP在域间级别创建瞬态环路,以及影响路由环路持续时间的主要因素是什么。作为一种路径向量路由协议,BGP消息列出了到每个目的地的整个As路径,路径信息使每个节点能够检测并中断涉及自身的任意长的路由循环。然而,由于物理约束和协议机制导致的延迟减慢了路由更新的传播速度,节点间路由信息不一致导致收敛过程中形成环路。研究表明,瞬态BGP环路的持续时间与BGP的路由收敛时间密切相关,并且环路持续时间与BGP的最小路由发布间隔定时器(MRAI)值成线性关系。我们还研究了四种BGP路由收敛增强,并表明在加速路由收敛方面有效的两种增强在减少路由环路方面也有效。
{"title":"A study of BGP path vector route looping behavior","authors":"Dan Pei, Xiaoliang Zhao, D. Massey, Lixia Zhang","doi":"10.1109/ICDCS.2004.1281640","DOIUrl":"https://doi.org/10.1109/ICDCS.2004.1281640","url":null,"abstract":"Measurements have shown evidences of inter-domain packet forwarding loops in the Internet, but the exact cause of these loops remains unclear. As one of the efforts in identifying the causes, this paper examines how transient loops can be created at the inter-domain level via BGP, and what are the major factors that contribute to duration of the routing loops. As a path-vector routing protocol, BGP messages list the entire AS path to each destination and the path information enables each node to detect, thus break, arbitrarily long routing loops involving itself. However, delays due to physical constrains and protocol mechanisms slow down routing updates propagation and the routing information inconsistencies among the nodes lead to loop formation during convergence. We show that the duration of transient BGP loops match closely to BGP's routing convergence time and the looping duration is linearly proportional to BGP's minimum route advertisement interval timer (MRAI) value. We also examine four BGP routing convergence enhancements and show that two enhancements effective in speeding up routing convergence are also effective in reducing routing loops.","PeriodicalId":348300,"journal":{"name":"24th International Conference on Distributed Computing Systems, 2004. Proceedings.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132764359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
Efficient Web services response caching by selecting optimal data representation 通过选择最佳数据表示实现高效的Web服务响应缓存
Pub Date : 2004-03-24 DOI: 10.1109/ICDCS.2004.1281583
Toshiro Takase, Michiaki Tatsubori
We discuss the design for an efficient response cache mechanism appropriate for the Web services architecture. The important feature of Web services is its interoperability between heterogeneous platforms. This interoperability is based on widely accepted standards such as XML, SOAP, and WSDL. We describe a response cache mechanism for Web services client middleware without any extensions to these standards so that the client can participate transparently in the existing Web services community. We propose three optimization methods to improve the performance of our response cache. The first optimization is caching the post-parsing representation instead of the XML message itself. The second is caching application objects. For this optimization, we show some copying processes that are dependent on the type of cached objects. The third optimization is for read-only objects. These methods reduce the overhead of XML processing or object copying. We have implemented a prototype of a response cache on Apache-Axis, and evaluated these optimization methods through experiments for Google Web services. Finally, based on the experimental results, we discuss the optimal configuration of these methods based on data types.
我们将讨论适合于Web服务体系结构的高效响应缓存机制的设计。Web服务的重要特性是它在异构平台之间的互操作性。这种互操作性基于广泛接受的标准,如XML、SOAP和WSDL。我们描述了Web服务客户机中间件的响应缓存机制,没有对这些标准进行任何扩展,以便客户机可以透明地参与到现有的Web服务社区中。我们提出了三种优化方法来提高响应缓存的性能。第一个优化是缓存解析后的表示,而不是XML消息本身。第二个是缓存应用程序对象。对于这个优化,我们展示了一些依赖于缓存对象类型的复制过程。第三个优化是针对只读对象的。这些方法减少了XML处理或对象复制的开销。我们在Apache-Axis上实现了一个响应缓存的原型,并通过针对Google Web服务的实验评估了这些优化方法。最后,在实验结果的基础上,讨论了基于数据类型的这些方法的最佳配置。
{"title":"Efficient Web services response caching by selecting optimal data representation","authors":"Toshiro Takase, Michiaki Tatsubori","doi":"10.1109/ICDCS.2004.1281583","DOIUrl":"https://doi.org/10.1109/ICDCS.2004.1281583","url":null,"abstract":"We discuss the design for an efficient response cache mechanism appropriate for the Web services architecture. The important feature of Web services is its interoperability between heterogeneous platforms. This interoperability is based on widely accepted standards such as XML, SOAP, and WSDL. We describe a response cache mechanism for Web services client middleware without any extensions to these standards so that the client can participate transparently in the existing Web services community. We propose three optimization methods to improve the performance of our response cache. The first optimization is caching the post-parsing representation instead of the XML message itself. The second is caching application objects. For this optimization, we show some copying processes that are dependent on the type of cached objects. The third optimization is for read-only objects. These methods reduce the overhead of XML processing or object copying. We have implemented a prototype of a response cache on Apache-Axis, and evaluated these optimization methods through experiments for Google Web services. Finally, based on the experimental results, we discuss the optimal configuration of these methods based on data types.","PeriodicalId":348300,"journal":{"name":"24th International Conference on Distributed Computing Systems, 2004. Proceedings.","volume":"45 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134060922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Robust emulations of shared memory in a crash-recovery model 在崩溃恢复模型中健壮地模拟共享内存
Pub Date : 2004-03-24 DOI: 10.1109/ICDCS.2004.1281605
R. Guerraoui, Ron R. Levy
A shared memory abstraction can be robustly emulated over an asynchronous message passing system where any process can fail by crashing and possibly recover (crash-recovery model), by having (a) the processes exchange messages to synchronize their read and write operations and (b) log key information on their local stable storage. This paper extends the existing atomicity consistency criterion defined for multiwriter/multireader shared memory in a crash-stop model, by providing two new criteria for the crash-recovery model. We introduce lower bounds on the log-complexity for each of the two corresponding types of robust shared memory emulations. We demonstrate that our lower bounds are tight by providing algorithms that match them. Besides being optimal, these algorithms have the same message and time complexity as their most efficient counterpart we know of in the crash-stop model.
共享内存抽象可以在异步消息传递系统上健壮地模拟,在异步消息传递系统中,任何进程都可能因崩溃和可能的恢复(崩溃恢复模型)而失败,方法是让(A)进程交换消息以同步它们的读写操作,(b)将关键信息记录在它们的本地稳定存储上。本文扩展了现有的多写/多读共享内存在崩溃停止模型中的原子一致性标准,为崩溃恢复模型提供了两个新的标准。我们介绍了两种相应类型的鲁棒共享内存模拟的日志复杂度的下界。我们通过提供与下界匹配的算法来证明下界是紧密的。除了最优之外,这些算法与我们所知道的最有效的碰撞停止模型具有相同的消息和时间复杂度。
{"title":"Robust emulations of shared memory in a crash-recovery model","authors":"R. Guerraoui, Ron R. Levy","doi":"10.1109/ICDCS.2004.1281605","DOIUrl":"https://doi.org/10.1109/ICDCS.2004.1281605","url":null,"abstract":"A shared memory abstraction can be robustly emulated over an asynchronous message passing system where any process can fail by crashing and possibly recover (crash-recovery model), by having (a) the processes exchange messages to synchronize their read and write operations and (b) log key information on their local stable storage. This paper extends the existing atomicity consistency criterion defined for multiwriter/multireader shared memory in a crash-stop model, by providing two new criteria for the crash-recovery model. We introduce lower bounds on the log-complexity for each of the two corresponding types of robust shared memory emulations. We demonstrate that our lower bounds are tight by providing algorithms that match them. Besides being optimal, these algorithms have the same message and time complexity as their most efficient counterpart we know of in the crash-stop model.","PeriodicalId":348300,"journal":{"name":"24th International Conference on Distributed Computing Systems, 2004. Proceedings.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115321676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Data indexing in peer-to-peer DHT networks 对等DHT网络中的数据索引
Pub Date : 2004-03-24 DOI: 10.1109/ICDCS.2004.1281584
L. Garcés-Erice, P. Felber, E. Biersack, G. Urvoy-Keller, K. Ross
Peer-to-peer distributed hash table (DHT) systems make it simple to discover specific data when their complete identifiers - or keys - are known in advance. In practice, however, users looking up resources stored in peer-to-peer systems often have only partial information for identifying these resources. We describe techniques for indexing data stored in peer-to-peer DHT networks, and discovering the resources that match a given user query. Our system creates multiple indexes, organized hierarchically, which permit users to locate data even using scarce information, although at the price of a higher lookup cost. The data itself is stored on only one (or few) of the nodes. Experimental evaluation demonstrates the effectiveness of our indexing techniques on a distributed peer-to-peer bibliographic database with realistic user query workloads.
点对点分布式哈希表(DHT)系统可以在事先知道特定数据的完整标识符(或密钥)时轻松地发现它们。然而,在实践中,查找存储在对等系统中的资源的用户通常只有用于标识这些资源的部分信息。我们描述了存储在对等DHT网络中的数据索引技术,以及发现与给定用户查询匹配的资源的技术。我们的系统创建了多个按层次组织的索引,这允许用户即使使用稀缺信息也能定位数据,尽管这是以更高的查找成本为代价的。数据本身只存储在一个(或几个)节点上。实验评估证明了我们的索引技术在具有实际用户查询工作负载的分布式点对点书目数据库上的有效性。
{"title":"Data indexing in peer-to-peer DHT networks","authors":"L. Garcés-Erice, P. Felber, E. Biersack, G. Urvoy-Keller, K. Ross","doi":"10.1109/ICDCS.2004.1281584","DOIUrl":"https://doi.org/10.1109/ICDCS.2004.1281584","url":null,"abstract":"Peer-to-peer distributed hash table (DHT) systems make it simple to discover specific data when their complete identifiers - or keys - are known in advance. In practice, however, users looking up resources stored in peer-to-peer systems often have only partial information for identifying these resources. We describe techniques for indexing data stored in peer-to-peer DHT networks, and discovering the resources that match a given user query. Our system creates multiple indexes, organized hierarchically, which permit users to locate data even using scarce information, although at the price of a higher lookup cost. The data itself is stored on only one (or few) of the nodes. Experimental evaluation demonstrates the effectiveness of our indexing techniques on a distributed peer-to-peer bibliographic database with realistic user query workloads.","PeriodicalId":348300,"journal":{"name":"24th International Conference on Distributed Computing Systems, 2004. Proceedings.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122613150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 96
A distributed approach to solving overlay mismatching problem 一种分布式解决叠加不匹配问题的方法
Pub Date : 2004-03-24 DOI: 10.1109/ICDCS.2004.1281576
Yunhao Liu, Zhenyun Zhuang, Li Xiao, L. Ni
In unstructured peer-to-peer (P2P) systems, the mechanism of a peer randomly joining and leaving a P2P network causes topology mismatching between the P2P logical overlay network and the physical underlying network, causing a large volume of redundant traffic in the Internet. In order to alleviate the mismatching problem, we propose adaptive connection establishment (ACE), an algorithm of building an overlay multicast tree among each source node and the peers within a certain diameter from the source peer, and further optimizing the neighbor connections that are not on the tree, while retaining the search scope. Our simulation study shows that this approach can effectively solve the mismatching problem and significantly reduce P2P traffic. We further study the tradeoffs between the topology optimization rate and the information exchange overhead by changing the diameter used to build the tree.
在非结构化P2P系统中,P2P网络的随机加入和随机退出机制导致P2P逻辑覆盖网络与底层物理网络的拓扑不匹配,从而导致Internet上产生大量冗余流量。为了缓解不匹配问题,提出了一种自适应连接建立(ACE)算法,该算法在每个源节点和距离源节点一定直径范围内的对等节点之间构建覆盖组播树,并在保留搜索范围的情况下进一步优化不在树上的邻居连接。仿真研究表明,该方法可以有效地解决不匹配问题,显著降低P2P流量。通过改变树的直径,我们进一步研究了拓扑优化率和信息交换开销之间的权衡。
{"title":"A distributed approach to solving overlay mismatching problem","authors":"Yunhao Liu, Zhenyun Zhuang, Li Xiao, L. Ni","doi":"10.1109/ICDCS.2004.1281576","DOIUrl":"https://doi.org/10.1109/ICDCS.2004.1281576","url":null,"abstract":"In unstructured peer-to-peer (P2P) systems, the mechanism of a peer randomly joining and leaving a P2P network causes topology mismatching between the P2P logical overlay network and the physical underlying network, causing a large volume of redundant traffic in the Internet. In order to alleviate the mismatching problem, we propose adaptive connection establishment (ACE), an algorithm of building an overlay multicast tree among each source node and the peers within a certain diameter from the source peer, and further optimizing the neighbor connections that are not on the tree, while retaining the search scope. Our simulation study shows that this approach can effectively solve the mismatching problem and significantly reduce P2P traffic. We further study the tradeoffs between the topology optimization rate and the information exchange overhead by changing the diameter used to build the tree.","PeriodicalId":348300,"journal":{"name":"24th International Conference on Distributed Computing Systems, 2004. Proceedings.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123945396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 104
A distributed approach to topology-aware overlay path monitoring 拓扑感知覆盖路径监控的分布式方法
Pub Date : 2004-03-24 DOI: 10.1109/ICDCS.2004.1281575
Chiping Tang, P. McKinley
Path probing is essential to maintain an efficient overlay network topology. However, the cost of complete probing can be as high as O(n/sup 2/), which is prohibitive in large-scale overlay networks. Recently we proposed a method that trades probing overhead for inference accuracy in sparse networks such as the Internet. The method uses physical path information to infer path quality for all of the n/spl times/(n-1) overlay paths, while actually probing only a subset of the paths. We propose and evaluate a distributed approach to implement this method. We describe a minimum diameter, link-stress bounded overlay spanning tree, which is used to collect and disseminate path quality information. All nodes in the tree collaborate to infer the quality of all paths. Simulation results show this approach can achieve a high-level of inference accuracy while reducing probing overhead and balancing link stress on the spanning tree.
路径探测对于保持有效的覆盖网络拓扑结构至关重要。然而,完全探测的成本可能高达O(n/sup 2/),这在大规模覆盖网络中是令人望而却步的。最近,我们提出了一种在稀疏网络(如Internet)中以探测开销换取推理精度的方法。该方法使用物理路径信息来推断所有n/spl次/(n-1)覆盖路径的路径质量,而实际上只探测路径的一个子集。我们提出并评估了一种分布式方法来实现该方法。我们描述了一个最小直径,链路应力有界覆盖生成树,用于收集和传播路径质量信息。树中的所有节点协作来推断所有路径的质量。仿真结果表明,该方法在降低探测开销和平衡生成树上链路应力的同时,可以达到较高的推理精度。
{"title":"A distributed approach to topology-aware overlay path monitoring","authors":"Chiping Tang, P. McKinley","doi":"10.1109/ICDCS.2004.1281575","DOIUrl":"https://doi.org/10.1109/ICDCS.2004.1281575","url":null,"abstract":"Path probing is essential to maintain an efficient overlay network topology. However, the cost of complete probing can be as high as O(n/sup 2/), which is prohibitive in large-scale overlay networks. Recently we proposed a method that trades probing overhead for inference accuracy in sparse networks such as the Internet. The method uses physical path information to infer path quality for all of the n/spl times/(n-1) overlay paths, while actually probing only a subset of the paths. We propose and evaluate a distributed approach to implement this method. We describe a minimum diameter, link-stress bounded overlay spanning tree, which is used to collect and disseminate path quality information. All nodes in the tree collaborate to infer the quality of all paths. Simulation results show this approach can achieve a high-level of inference accuracy while reducing probing overhead and balancing link stress on the spanning tree.","PeriodicalId":348300,"journal":{"name":"24th International Conference on Distributed Computing Systems, 2004. Proceedings.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116003871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Coordinating adaptations in distributed systems 在分布式系统中协调适应
Pub Date : 2004-03-24 DOI: 10.1109/ICDCS.2004.1281611
Brian Ensink, Vikram S. Adve
Distributed applications may use sophisticated runtime adaptation strategies to meet their performance or quality-of-service goals. Coordinating an adaptation that involves multiple processes can require complex communication or synchronization, in addition to communication in the base application. We propose conceptually simple high-level directives and a sophisticated runtime algorithm for coordinating adaptation automatically and transparently in distributed applications. The coordination directives specify when to adapt, in terms of the relative computational progress of each relevant process. The coordination algorithm relies on simple compiler transformations to track the progress of the processes, and performs the adaptive changes locally and asynchronously at each process. Measurements of the runtime overhead of the automatic coordination algorithm for two adaptive applications (a parallel PDE solver and a distributed video tracking code) show that the overhead is less than 1% of execution time for both these codes, even with relatively frequent adaptations, and does not grow significantly with the number of coordinating processes.
分布式应用程序可以使用复杂的运行时适应策略来满足其性能或服务质量目标。除了基本应用程序中的通信之外,协调涉及多个流程的适应可能需要复杂的通信或同步。我们提出了概念上简单的高级指令和复杂的运行时算法,用于在分布式应用程序中自动透明地协调自适应。协调指令根据每个相关进程的相对计算进度指定何时进行调整。协调算法依靠简单的编译器转换来跟踪进程的进度,并在每个进程中本地异步地执行自适应更改。对两个自适应应用程序(并行PDE求解器和分布式视频跟踪代码)的自动协调算法的运行时开销的测量表明,这两个代码的开销都不到执行时间的1%,即使有相对频繁的调整,并且不随协调进程的数量而显着增长。
{"title":"Coordinating adaptations in distributed systems","authors":"Brian Ensink, Vikram S. Adve","doi":"10.1109/ICDCS.2004.1281611","DOIUrl":"https://doi.org/10.1109/ICDCS.2004.1281611","url":null,"abstract":"Distributed applications may use sophisticated runtime adaptation strategies to meet their performance or quality-of-service goals. Coordinating an adaptation that involves multiple processes can require complex communication or synchronization, in addition to communication in the base application. We propose conceptually simple high-level directives and a sophisticated runtime algorithm for coordinating adaptation automatically and transparently in distributed applications. The coordination directives specify when to adapt, in terms of the relative computational progress of each relevant process. The coordination algorithm relies on simple compiler transformations to track the progress of the processes, and performs the adaptive changes locally and asynchronously at each process. Measurements of the runtime overhead of the automatic coordination algorithm for two adaptive applications (a parallel PDE solver and a distributed video tracking code) show that the overhead is less than 1% of execution time for both these codes, even with relatively frequent adaptations, and does not grow significantly with the number of coordinating processes.","PeriodicalId":348300,"journal":{"name":"24th International Conference on Distributed Computing Systems, 2004. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130733699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Roaming honeypots for mitigating service-level denial-of-service attacks 用于减轻服务级拒绝服务攻击的漫游蜜罐
Pub Date : 2004-03-24 DOI: 10.1109/ICDCS.2004.1281598
S. Khattab, Chatree Sangpachatanaruk, D. Mossé, R. Melhem, T. Znati
Honeypots have been proposed to act as traps for malicious attackers. However, because of their deployment at fixed (thus detectable) locations and on machines other than the ones they are supposed to protect, honeypots can be avoided by sophisticated attacks. We propose roaming honeypots, a mechanism that allows the locations of honeypots to be unpredictable, continuously changing, and disguised within a server pool. A (continuously changing) subset of the servers is active and providing service, while the rest of the server pool is idle and acting as honeypots. We utilize our roaming honeypots scheme to mitigate the effects of service-level DoS attacks, in which many attack machines acquire service from a victim server at a high rate, against back-end servers of private services. The roaming honeypots scheme detects and filters attack traffic from outside a firewall (external attacks), and also mitigates attacks from behind a firewall (internal attacks) by dropping all connections when a server switches from acting as a honeypot into being active. Through ns-2 simulations, we show the effectiveness of our roaming honeypots scheme. In particular, against external attacks, our roaming honeypots scheme provides service response time that is independent of attack load for a fixed number of attack machines.
蜜罐被提议作为恶意攻击者的陷阱。然而,由于蜜罐部署在固定的(因此可检测的)位置和机器上,而不是它们应该保护的机器上,因此可以通过复杂的攻击来避免蜜罐。我们提出漫游蜜罐,这种机制允许蜜罐的位置是不可预测的,不断变化的,并在服务器池中伪装。服务器的一个(不断变化的)子集处于活动状态并提供服务,而服务器池的其余部分处于空闲状态并充当蜜罐。我们利用漫游蜜罐方案来减轻服务级DoS攻击的影响,在这种攻击中,许多攻击机器以高速率从受害者服务器获取服务,针对私有服务的后端服务器。漫游蜜罐方案检测和过滤来自防火墙外部的攻击流量(外部攻击),并通过在服务器从蜜罐切换到活动状态时断开所有连接来减轻来自防火墙后的攻击(内部攻击)。通过ns-2仿真,验证了漫游蜜罐方案的有效性。特别是,针对外部攻击,我们的漫游蜜罐方案为固定数量的攻击机器提供了与攻击负载无关的服务响应时间。
{"title":"Roaming honeypots for mitigating service-level denial-of-service attacks","authors":"S. Khattab, Chatree Sangpachatanaruk, D. Mossé, R. Melhem, T. Znati","doi":"10.1109/ICDCS.2004.1281598","DOIUrl":"https://doi.org/10.1109/ICDCS.2004.1281598","url":null,"abstract":"Honeypots have been proposed to act as traps for malicious attackers. However, because of their deployment at fixed (thus detectable) locations and on machines other than the ones they are supposed to protect, honeypots can be avoided by sophisticated attacks. We propose roaming honeypots, a mechanism that allows the locations of honeypots to be unpredictable, continuously changing, and disguised within a server pool. A (continuously changing) subset of the servers is active and providing service, while the rest of the server pool is idle and acting as honeypots. We utilize our roaming honeypots scheme to mitigate the effects of service-level DoS attacks, in which many attack machines acquire service from a victim server at a high rate, against back-end servers of private services. The roaming honeypots scheme detects and filters attack traffic from outside a firewall (external attacks), and also mitigates attacks from behind a firewall (internal attacks) by dropping all connections when a server switches from acting as a honeypot into being active. Through ns-2 simulations, we show the effectiveness of our roaming honeypots scheme. In particular, against external attacks, our roaming honeypots scheme provides service response time that is independent of attack load for a fixed number of attack machines.","PeriodicalId":348300,"journal":{"name":"24th International Conference on Distributed Computing Systems, 2004. Proceedings.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116836106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 85
Fault-tolerant data delivery for multicast overlay networks 多播覆盖网络的容错数据传输
Pub Date : 2004-03-24 DOI: 10.1109/ICDCS.2004.1281635
V. Pappas, Beichuan Zhang, A. Terzis, Lixia Zhang
Overlay networks represent an emerging technology for rapid deployment of novel network services and applications. However, since public overlay networks are built out of loosely coupled end-hosts, individual nodes are less trustworthy than Internet routers in carrying out the data forwarding function. Here we describe a set of mechanisms designed to detect and repair errors in the data stream. Utilizing the highly redundant connectivity in overlay networks, our design splits each data stream to multiple sub-streams which are delivered over disjoint paths. Each sub-stream carries additional information that enables receivers to detect damaged or lost packets. Furthermore, each node can verify the validity of data by periodically exchanging Bloom filters, the digests of recently received packets, with other nodes in the overlay. We have evaluated our design through both simulations and experiments over a network testbed. The results show that most nodes can effectively detect corrupted data streams even in the presence of multiple tampering nodes.
覆盖网络代表了一种快速部署新型网络服务和应用的新兴技术。然而,由于公共覆盖网络是由松散耦合的终端主机构建的,因此在执行数据转发功能方面,单个节点不如互联网路由器可信。在这里,我们描述了一组用于检测和修复数据流中的错误的机制。利用覆盖网络中的高度冗余连接,我们的设计将每个数据流拆分为多个子流,这些子流通过不相交的路径交付。每个子流携带额外的信息,使接收器能够检测损坏或丢失的数据包。此外,每个节点可以通过与覆盖层中的其他节点定期交换Bloom过滤器(最近收到的数据包摘要)来验证数据的有效性。我们通过网络测试平台上的模拟和实验来评估我们的设计。结果表明,即使存在多个篡改节点,大多数节点也能有效地检测到损坏的数据流。
{"title":"Fault-tolerant data delivery for multicast overlay networks","authors":"V. Pappas, Beichuan Zhang, A. Terzis, Lixia Zhang","doi":"10.1109/ICDCS.2004.1281635","DOIUrl":"https://doi.org/10.1109/ICDCS.2004.1281635","url":null,"abstract":"Overlay networks represent an emerging technology for rapid deployment of novel network services and applications. However, since public overlay networks are built out of loosely coupled end-hosts, individual nodes are less trustworthy than Internet routers in carrying out the data forwarding function. Here we describe a set of mechanisms designed to detect and repair errors in the data stream. Utilizing the highly redundant connectivity in overlay networks, our design splits each data stream to multiple sub-streams which are delivered over disjoint paths. Each sub-stream carries additional information that enables receivers to detect damaged or lost packets. Furthermore, each node can verify the validity of data by periodically exchanging Bloom filters, the digests of recently received packets, with other nodes in the overlay. We have evaluated our design through both simulations and experiments over a network testbed. The results show that most nodes can effectively detect corrupted data streams even in the presence of multiple tampering nodes.","PeriodicalId":348300,"journal":{"name":"24th International Conference on Distributed Computing Systems, 2004. Proceedings.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133280124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
EnviroTrack: towards an environmental computing paradigm for distributed sensor networks 面向分布式传感器网络的环境计算范式
Pub Date : 2004-03-24 DOI: 10.1109/ICDCS.2004.1281625
T. Abdelzaher, Brian M. Blum, Qing Cao, Yong Chen, David Evans, Jemin George, S. George, Lin Gu, T. He, S. Krishnamurthy, L. Luo, S. Son, J. Stankovic, R. Stoleru, A. Wood
Distributed sensor networks are quickly gaining recognition as viable embedded computing platforms. Current techniques for programming sensor networks are cumbersome, inflexible, and low-level. We introduce EnviroTrack, an object-based distributed middleware system that raises the level of programming abstraction by providing a convenient and powerful interface to the application developer geared towards tracking the physical environment. EnviroTrack is novel in its seamless integration of objects that live in physical time and space into the computational environment of the application. Performance results demonstrate the ability of the middleware to track realistic targets.
分布式传感器网络作为可行的嵌入式计算平台正迅速获得认可。当前的传感器网络编程技术繁琐、不灵活、层次低。我们介绍了EnviroTrack,这是一个基于对象的分布式中间件系统,通过为应用程序开发人员提供方便而强大的接口来跟踪物理环境,从而提高了编程抽象的水平。EnviroTrack的新颖之处在于它将存在于物理时间和空间中的对象无缝集成到应用程序的计算环境中。性能结果展示了中间件跟踪实际目标的能力。
{"title":"EnviroTrack: towards an environmental computing paradigm for distributed sensor networks","authors":"T. Abdelzaher, Brian M. Blum, Qing Cao, Yong Chen, David Evans, Jemin George, S. George, Lin Gu, T. He, S. Krishnamurthy, L. Luo, S. Son, J. Stankovic, R. Stoleru, A. Wood","doi":"10.1109/ICDCS.2004.1281625","DOIUrl":"https://doi.org/10.1109/ICDCS.2004.1281625","url":null,"abstract":"Distributed sensor networks are quickly gaining recognition as viable embedded computing platforms. Current techniques for programming sensor networks are cumbersome, inflexible, and low-level. We introduce EnviroTrack, an object-based distributed middleware system that raises the level of programming abstraction by providing a convenient and powerful interface to the application developer geared towards tracking the physical environment. EnviroTrack is novel in its seamless integration of objects that live in physical time and space into the computational environment of the application. Performance results demonstrate the ability of the middleware to track realistic targets.","PeriodicalId":348300,"journal":{"name":"24th International Conference on Distributed Computing Systems, 2004. Proceedings.","volume":"326 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122834815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 274
期刊
24th International Conference on Distributed Computing Systems, 2004. Proceedings.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1