Countering Targeted File Attacks Using LocationGuard

نویسندگان

  • Mudhakar Srivatsa
  • Ling Liu
چکیده

1 Serverless distributed computing has received significant attention from both the industry and the research community. Among the most popular applications are the wide area network file systems, exemplified by CFS [4], Farsite [1] and OceanStore [12]. These file systems store files on a large collection of untrusted nodes that form an overlay network. They use cryptographic techniques to secure files from malicious nodes. Unfortunately, cryptographic techniques cannot protect a file holder from a Denial-of-Service (DoS) or a host compromise attack. Hence, most of these distributed file systems are vulnerable to targeted file attacks, wherein an adversary attempts to attack a small (chosen) set of files by attacking the nodes that host them. This paper presents LocationGuard − a location hiding technique for securing overlay file storage systems from targeted file attacks. LocationGuard has three essential components: (i) location key, consisting of a random bit string (e.g., 128 bits) that serves as the key to the location of a file, (ii) lookup guard, a secure algorithm to locate a file in the overlay network given its location key such that neither the key nor the location is revealed to an adversary, and (iii) a set of location inference guards, which refer to an extensible component of the LocationGuard. The basic core of this component includes four pluggable inference guards: (a) lookup frequency inference guard, (b) end-user IP-address inference guard, (c) file replica inference guard, and (d) file size inference guard. The combination of location key, lookup guard, and location inference guards makes it very hard for an adversary to infer the location of a target file by either actively or passively observing the overlay network. In addition to traditional cryptographic guarantees like file confidentiality and integrity, LocationGuard can be used to mitigate Denial-of-Service (DoS) and host compromise attacks by constructing an efficient file access control mechanism, while adding almost zero performance overhead and very minimal storage overhead to the overlay file system. Our experimental results quantify the overhead of employing LocationGuard and demonstrate its effectiveness against DoS attacks, host compromise attacks and various location inference attacks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Countering Targeted File Attacks Using Location Keys

Serverless distributed computing has received significant attention from both the industry and research community. One of its typical applications is wide area network file systems like CFS [4], Farsite [2] and OceanStore [9]. A unique feature of these file systems is that they are serverless. They store files on a large collection of untrusted nodes that form an overlay network. They use crypt...

متن کامل

The Effectiveness Of The Locationguard Scheme Against DoS Attacks

Server less distributed computing has received significant attention from both the business and the investigate society. Among the most popular applications are the wide-area network file systems, exemplified by CFS, Farsite, and Ocean Store. These file systems store files on a large collection of untrusted nodes that form an overlay network. They use cryptographic techniques to maintain file c...

متن کامل

A Study of Security Patch Dissemination for Combating File-sharing Worms

Worm attacks in file-sharing applications have been terrorizing P2P networks in recent years. Existing solutions to these imminent threats are rather passive by relying on user’s individual recovery or limiting filesharing services. To be more scalable and effective in combating file-sharing worms, automated and systematic countermeasures must be developed. In this work, we study the feasibilit...

متن کامل

Theoretical and Computational Evaluation of the Use of Molecular Nanoelectronic Technology in Targeted Monitoring of Electrical Brain Waves to Predict Some Neuro-cerebral Attacks

Abstract Background and Objectives: Today, it is expected that by using molecular nanoelectronic, the symptoms emitted from neurons will be studied. Many studies show that abnormalities in the normal functioning of brain cells can lead to neurological attacks. One of the most common brain system defects is epileptic seizures. In this case, due to the electrical discharge of a group of neurons,...

متن کامل

O-checker: Detection of Malicious Documents through Deviation from File Format Specifications

Documents containing executable files are often used in targeted email attacks in Japan. We examine various document formats (Rich Text Format, Compound File Binary and Portable Document Format) for files used in targeted attacks from 2009 to 2012 in Japan. Almost all the examined document files contain executable files that ignore the document file format specifications. Therefore, we focus on...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005