As we increase our dependency upon networked communication, the
incentive to compromise and degrade network performance increases for
those who wish to disrupt the flow of information. Attacks that lead
to such compromise and degradation can come in a variety of forms,
including distributed denial of service (DDoS) attacks, cutting wires,
jamming transmissions, and monitoring/eavesdropping. Users can
protect themselves from monitoring by applying cryptographic
techniques, and the recent work has explored developing networks that
react to DDoS attacks by locating the source(s) of the attack.
However, there has been little work that addresses preventing the
other kinds of attacks as opposed to reacting to them. Here, we
discuss how network overlays can be used to complicate the job of an
attacker that wishes to prevent communication. To amplify our point,
we focus briefly on a study of preventing DDoS attacks by using
overlays.
Connectivity within ad-hoc and peer-to-peer networks undergoes
constant change. One approach to reducing the cost of finding
information within these networks is to replicate the information
among multiple points within the network. A desirable replication
approach should cache copies of all pieces of information as close to
each node as possible without exceeding the storage resources of the
nodes within the network. In addition, the approach should require
minimum communication overhead among participating nodes and should
adjust the locations of stored content as connectivity within the
network changes. Here, we formulate this caching problem as a graph
coloring problem, where the color of the node determines the content
that the node should store. We present a distributed algorithm where
each node chooses its color in a greedy manner, minimizing its own
distance to the color furthest from it. We demonstrate convergence of
this algorithm and evaluate its performance in the context of its
ability to place information near all nodes in the network.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.