Defending against eclipse attacks on overlay networks

@inproceedings{Singh2004DefendingAE,
  title={Defending against eclipse attacks on overlay networks},
  author={Atul Singh and Miguel Castro and Peter Druschel and Antony I. T. Rowstron},
  booktitle={ACM SIGOPS European Workshop},
  year={2004}
}
Overlay networks are widely used to deploy functionality at edge nodes without changing network routers. Each node in an overlay network maintains pointers to a set of neighbor nodes. These pointers are used both to maintain the overlay and to implement application functionality, for example, to locate content stored by overlay nodes. If an attacker controls a large fraction of the neighbors of correct nodes, it can "eclipse" correct nodes and prevent correct overlay operation. This Eclipse… CONTINUE READING
Highly Cited
This paper has 160 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 106 extracted citations

160 Citations

0102030'07'10'13'16
Citations per Year
Semantic Scholar estimates that this publication has 160 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-4 of 4 references

Exploiting network proximity in peer-to-peer overlay networks

  • M. Castro, P. Druschel, Y. C. Hu, A. Rowstron
  • Technical Report MSR-TR-2002-82, Microsoft…
  • 2002
Highly Influential
11 Excerpts

Similar Papers

Loading similar papers…