Countering Targeted File Attacks Using LocationGuard
نویسندگان
چکیده
1 Serverless distributed computing has received significant attention from both the industry and the research community. Among the most popular applications are the wide area network file systems, exemplified by CFS [4], Farsite [1] and OceanStore [12]. These file systems store files on a large collection of untrusted nodes that form an overlay network. They use cryptographic techniques to secure files from malicious nodes. Unfortunately, cryptographic techniques cannot protect a file holder from a Denial-of-Service (DoS) or a host compromise attack. Hence, most of these distributed file systems are vulnerable to targeted file attacks, wherein an adversary attempts to attack a small (chosen) set of files by attacking the nodes that host them. This paper presents LocationGuard − a location hiding technique for securing overlay file storage systems from targeted file attacks. LocationGuard has three essential components: (i) location key, consisting of a random bit string (e.g., 128 bits) that serves as the key to the location of a file, (ii) lookup guard, a secure algorithm to locate a file in the overlay network given its location key such that neither the key nor the location is revealed to an adversary, and (iii) a set of location inference guards, which refer to an extensible component of the LocationGuard. The basic core of this component includes four pluggable inference guards: (a) lookup frequency inference guard, (b) end-user IP-address inference guard, (c) file replica inference guard, and (d) file size inference guard. The combination of location key, lookup guard, and location inference guards makes it very hard for an adversary to infer the location of a target file by either actively or passively observing the overlay network. In addition to traditional cryptographic guarantees like file confidentiality and integrity, LocationGuard can be used to mitigate Denial-of-Service (DoS) and host compromise attacks by constructing an efficient file access control mechanism, while adding almost zero performance overhead and very minimal storage overhead to the overlay file system. Our experimental results quantify the overhead of employing LocationGuard and demonstrate its effectiveness against DoS attacks, host compromise attacks and various location inference attacks.
منابع مشابه
Countering Targeted File Attacks Using Location Keys
Serverless distributed computing has received significant attention from both the industry and research community. One of its typical applications is wide area network file systems like CFS [4], Farsite [2] and OceanStore [9]. A unique feature of these file systems is that they are serverless. They store files on a large collection of untrusted nodes that form an overlay network. They use crypt...
متن کاملThe Effectiveness Of The Locationguard Scheme Against DoS Attacks
Server less distributed computing has received significant attention from both the business and the investigate society. Among the most popular applications are the wide-area network file systems, exemplified by CFS, Farsite, and Ocean Store. These file systems store files on a large collection of untrusted nodes that form an overlay network. They use cryptographic techniques to maintain file c...
متن کاملA Study of Security Patch Dissemination for Combating File-sharing Worms
Worm attacks in file-sharing applications have been terrorizing P2P networks in recent years. Existing solutions to these imminent threats are rather passive by relying on user’s individual recovery or limiting filesharing services. To be more scalable and effective in combating file-sharing worms, automated and systematic countermeasures must be developed. In this work, we study the feasibilit...
متن کاملTheoretical and Computational Evaluation of the Use of Molecular Nanoelectronic Technology in Targeted Monitoring of Electrical Brain Waves to Predict Some Neuro-cerebral Attacks
Abstract Background and Objectives: Today, it is expected that by using molecular nanoelectronic, the symptoms emitted from neurons will be studied. Many studies show that abnormalities in the normal functioning of brain cells can lead to neurological attacks. One of the most common brain system defects is epileptic seizures. In this case, due to the electrical discharge of a group of neurons,...
متن کاملO-checker: Detection of Malicious Documents through Deviation from File Format Specifications
Documents containing executable files are often used in targeted email attacks in Japan. We examine various document formats (Rich Text Format, Compound File Binary and Portable Document Format) for files used in targeted attacks from 2009 to 2012 in Japan. Almost all the examined document files contain executable files that ignore the document file format specifications. Therefore, we focus on...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005