Battery Exhaustion Attacks - PowerPoint PPT Presentation

1 / 5
About This Presentation
Title:

Battery Exhaustion Attacks

Description:

Description: an attack that drains the power of a device's battery reducing the ... Rationale attack, Sybil attack, Eclipse attack, ... – PowerPoint PPT presentation

Number of Views:53
Avg rating:3.0/5.0
Slides: 6
Provided by: DB282
Category:

less

Transcript and Presenter's Notes

Title: Battery Exhaustion Attacks


1
Battery Exhaustion Attacks Peer-to-Peer Attacks
  • douglas b. burda

2
Battery Exhaustion Attacks
Taxonomy
3
Battery Exhaustion Attacks
  • Description an attack that drains the power of a
    devices battery reducing the expected life of
    the device, and, thereby, the full utility of the
    device.
  • Classification 3 major categories of attacks-
  • Malignant attack- virus used to make a device
    excessively consume its own power
  • May be detected using known virus detection
    techniques.
  • Benign attack- unmodified program is given data
    such that it consumes excessive power and
  • More difficult to detect due to implementation in
    unmodified code.
  • Service request attack- device is forced to make
    repeated requests to network provider.
  • Main detection issues differentiate attacks from
    false positives, reduce consumption of detection
    mechanisms.
  • Proposed detection mechanism Power-Secure
    Architecture.

4
Peer-to-Peer Attacks
  • Description an attack with the purpose of either
    compromising data within a Peer-to-Peer system,
    or attacking the Peer-to-Peer application itself.
  • Classification 2 major categories of attacks-
  • Data plane attack- an attack targeting the data
    used within a Peer-to-Peer application.
  • File poisoning/pollution attack.
  • Control plane attack- an attack targeting the
    functionality of a Peer-to-Peer application.
  • Rationale attack, Sybil attack, Eclipse attack,
  • Main Detection Issues placement of nodes within
    the system, aspects of P2P upheld.
  • Proposed Detection Mechanism randomly dispersed
    identities, trusted signing authorities,
    cryptography.

5
Peer-to-Peer Attacks
Data plane attack Diagram
Write a Comment
User Comments (0)
About PowerShow.com