JOURNAL ARTICLE

Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification

Abstract

Overlay multicast networks are used by service providers to distribute contents such as Web pages, streaming multimedia data, or security updates to a large number of users. However, such networks are extremely vulnerable to message dropping attacks by malicious or selfish nodes that intentionally drop packets they are required to forward. It is difficult to detect such attacks both efficiently and effectively, not mentioning to further identify the attackers, especially when members in the overlay switch between online/offline statuses frequently. We propose a random-sampling-based scheme to detect such attacks, and a path-resolving-based scheme to identify the attack nodes. Our schemes work for dynamic overlay networks and do not assume the global knowledge of the overlay hierarchy. Analysis and simulation results show that our schemes are bandwidth-efficient and they both have high detection/identification rates but low false positive rates

Keywords:
Computer science Overlay multicast Computer network Overlay Overlay network Network packet Multicast Scheme (mathematics) Identification (biology) Bandwidth (computing) Computer security The Internet Reliable multicast Xcast

Metrics

11
Cited By
2.10
FWCI (Field Weighted Citation Impact)
19
Refs
0.83
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Peer-to-Peer Network Technologies
Physical Sciences →  Computer Science →  Computer Networks and Communications
Internet Traffic Analysis and Secure E-voting
Physical Sciences →  Computer Science →  Artificial Intelligence
Caching and Content Delivery
Physical Sciences →  Computer Science →  Computer Networks and Communications

Related Documents

JOURNAL ARTICLE

Message Dropping Attacks in Overlay Networks

Liang XieSencun Zhu

Journal:   ACM Transactions on Information and System Security Year: 2008 Vol: 11 (3)Pages: 1-30
JOURNAL ARTICLE

DDoS Attack Detection and Attacker Identification

Brajesh KashyapSanjay Kumar Jena

Journal:   International Journal of Computer Applications Year: 2012 Vol: 42 (1)Pages: 27-33
JOURNAL ARTICLE

Face morphing attack detection and attacker identification based on a watchlist

Fei PengLe QinMin Long

Journal:   Signal Processing Image Communication Year: 2022 Vol: 107 Pages: 116748-116748
© 2026 ScienceGate Book Chapters — All rights reserved.