Detecting and Defending against Malicious Attacks in the iTrust ...
Detecting and Defending against Malicious Attacks in the iTrust ...
Detecting and Defending against Malicious Attacks in the iTrust ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Conclusions<br />
<strong>iTrust</strong> is desirable for <strong>in</strong>dividuals who fear<br />
censorship of <strong>in</strong>formation accessed on <strong>the</strong> Internet<br />
We have presented novel statistical algorithms for<br />
detect<strong>in</strong>g <strong>and</strong> defend<strong>in</strong>g <strong>aga<strong>in</strong>st</strong> malicious attacks<br />
Detection algorithm estimates <strong>the</strong> proportion of nodes that are<br />
subverted or non-operational, based on <strong>the</strong> number of<br />
responses that a request<strong>in</strong>g node receives<br />
Defensive adaptation algorithm determ<strong>in</strong>es <strong>the</strong> number of<br />
nodes to which <strong>the</strong> metadata <strong>and</strong> <strong>the</strong> requests must distributed<br />
to ma<strong>in</strong>ta<strong>in</strong> <strong>the</strong> same probability of a match, as when all <strong>the</strong><br />
nodes are operational<br />
ICOIN 2012 <strong>iTrust</strong> Yung-T<strong>in</strong>g Chuang