Team for Research in
Ubiquitous Secure Technology

Defense Against Intrusion in a Live-Streaming Multicast System
Maya Haridasan, Robbert Van Renesse, Haavard Johansen

Citation
Maya Haridasan, Robbert Van Renesse, Haavard Johansen. "Defense Against Intrusion in a Live-Streaming Multicast System". Talk or presentation, 27, April, 2006.

Abstract
Application-level multicast systems are vulnerable to attacks that impede nodes from receiving desired data. Live streaming protocols are especially susceptible to packet loss induced by malicious behavior. In this project we are working on an application-level live streaming system built using a pull-based architecture that results in improved tolerance of malicious behavior. Our system is implemented as a layer running over Fireflies, an intrusion-tolerant membership protocol. We have conducted simulation and emulation experiments that confirm the system's improved resilience to attack.

Electronic downloads

Citation formats  
  • HTML
     Maya Haridasan, Robbert Van Renesse, Haavard Johansen.
    <a href="http://www.truststc.org/pubs/77.html"
    ><i>Defense Against Intrusion in a Live-Streaming
    Multicast System</i></a>, Talk or presentation, 
    27, April, 2006.
  • Plain text
     Maya Haridasan, Robbert Van Renesse, Haavard Johansen.
    "Defense Against Intrusion in a Live-Streaming
    Multicast System". Talk or presentation,  27, April,
    2006.
  • BibTeX
    @presentation{HaridasanRenesseJohansen06_DefenseAgainstIntrusionInLiveStreamingMulticastSystem,
        author = { Maya Haridasan, Robbert Van Renesse, Haavard
                  Johansen},
        title = {Defense Against Intrusion in a Live-Streaming
                  Multicast System},
        day = {27},
        month = {April},
        year = {2006},
        abstract = {Application-level multicast systems are vulnerable
                  to attacks that impede nodes from receiving
                  desired data. Live streaming protocols are
                  especially susceptible to packet loss induced by
                  malicious behavior. In this project we are working
                  on an application-level live streaming system
                  built using a pull-based architecture that results
                  in improved tolerance of malicious behavior. Our
                  system is implemented as a layer running over
                  Fireflies, an intrusion-tolerant membership
                  protocol. We have conducted simulation and
                  emulation experiments that confirm the system's
                  improved resilience to attack.},
        URL = {http://www.truststc.org/pubs/77.html}
    }
    

Posted by Christopher Brooks on 4 May 2006.
Groups: trust
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.