Countering Hidden-Action Attacks on Networked Systems

We define an economic category of hidden-action attacks: actions made attractive by a lack of observation. We then consider its implications for computer systems. Rather than structure contracts to compensate for incentive problems, we rely on insights from social capital theory to design network topologies and interactions that undermine the potential for hidden-action attacks.

[1]  Terence H. Qualter,et al.  Democracy and the Market , 1991 .

[2]  Stuart E. Schechter Toward econometric models of the security risk from remote attacks , 2005, IEEE Security & Privacy.

[3]  Dan S. Wallach,et al.  Enforcing Fair Sharing of Peer-to-Peer Resources , 2003, IPTPS.

[4]  Muhammad Yunus,et al.  Group-based savings and credit for the rural poor , 1986 .

[5]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[6]  Ion Stoica,et al.  Robust incentive techniques for peer-to-peer networks , 2004, EC '04.

[7]  P. Dasgupta Trust as a commodity , 1988 .

[8]  Noam Nisan,et al.  Algorithms for selfish agents mechanism design for distributed computation , 1999 .

[9]  R. Anderson The Eternity Service , 1996 .

[10]  David C. Parkes,et al.  Rationality and Self-Interest in Peer to Peer Networks , 2003, IPTPS.

[11]  Christos H. Papadimitriou,et al.  Free-riding and whitewashing in peer-to-peer systems , 2004, IEEE Journal on Selected Areas in Communications.

[12]  P. Dasgupta Social Capital and Economic Performance: Analytics* , 2002 .

[13]  L. Camp Economics of Information Security , 2006 .

[14]  J.-P. Hubaux,et al.  Enforcing service availability in mobile ad-hoc WANs , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).

[15]  Joan Feigenbaum,et al.  A BGP-based mechanism for lowest-cost routing , 2002, PODC '02.

[16]  George Danezis,et al.  The Economics of Censorship Resistance , 2004 .

[17]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[18]  Scott Shenker,et al.  Hidden-action in multi-hop routing , 2005, EC '05.

[19]  Jean-Yves Le Boudec,et al.  Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.

[20]  Elinor Ostrom,et al.  Foundations of Social Capital , 2003 .

[21]  Ross J. Anderson Why information security is hard - an economic perspective , 2001, Seventeenth Annual Computer Security Applications Conference.

[22]  Levente Buttyán,et al.  Enforcing service availability in mobile ad-hoc WANs , 2000, MobiHoc.

[23]  Hal R. Varian,et al.  Economic Mechanism Design for Computerized Agents , 1995, USENIX Workshop on Electronic Commerce.

[24]  Ross J. Anderson,et al.  On dealing with adversaries fairly , 2004 .

[25]  Eytan Adar,et al.  Free Riding on Gnutella , 2000, First Monday.

[26]  P. Dasgupta,et al.  Social capital : a multifaceted perspective , 1999 .

[27]  Joan Feigenbaum,et al.  A BGP-based mechanism for lowest-cost routing , 2002, PODC '02.