06.06.2013 Views

Detecting and Defending against Malicious Attacks in the iTrust ...

Detecting and Defending against Malicious Attacks in the iTrust ...

Detecting and Defending against Malicious Attacks in the iTrust ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Conclusions<br />

<strong>iTrust</strong> is desirable for <strong>in</strong>dividuals who fear<br />

censorship of <strong>in</strong>formation accessed on <strong>the</strong> Internet<br />

We have presented novel statistical algorithms for<br />

detect<strong>in</strong>g <strong>and</strong> defend<strong>in</strong>g <strong>aga<strong>in</strong>st</strong> malicious attacks<br />

Detection algorithm estimates <strong>the</strong> proportion of nodes that are<br />

subverted or non-operational, based on <strong>the</strong> number of<br />

responses that a request<strong>in</strong>g node receives<br />

Defensive adaptation algorithm determ<strong>in</strong>es <strong>the</strong> number of<br />

nodes to which <strong>the</strong> metadata <strong>and</strong> <strong>the</strong> requests must distributed<br />

to ma<strong>in</strong>ta<strong>in</strong> <strong>the</strong> same probability of a match, as when all <strong>the</strong><br />

nodes are operational<br />

ICOIN 2012 <strong>iTrust</strong> Yung-T<strong>in</strong>g Chuang

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!