{"id":"https://openalex.org/W2073879659","doi":"https://doi.org/10.1145/1341731.1341736","title":"Message Dropping Attacks in Overlay Networks","display_name":"Message Dropping Attacks in Overlay Networks","publication_year":2008,"publication_date":"2008-03-01","ids":{"openalex":"https://openalex.org/W2073879659","doi":"https://doi.org/10.1145/1341731.1341736","mag":"2073879659"},"language":"en","primary_location":{"id":"doi:10.1145/1341731.1341736","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1341731.1341736","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059125353","display_name":"Liang Xie","orcid":"https://orcid.org/0000-0002-9335-5606"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Liang Xie","raw_affiliation_strings":["The Pennsylvania State University","(The Pennsylvania State University"],"affiliations":[{"raw_affiliation_string":"The Pennsylvania State University","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"(The Pennsylvania State University","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101952501","display_name":"Sencun Zhu","orcid":"https://orcid.org/0000-0002-1047-7967"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sencun Zhu","raw_affiliation_strings":["The Pennsylvania State University","(The Pennsylvania State University"],"affiliations":[{"raw_affiliation_string":"The Pennsylvania State University","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"(The Pennsylvania State University","institution_ids":["https://openalex.org/I130769515"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5059125353"],"corresponding_institution_ids":["https://openalex.org/I130769515"],"apc_list":null,"apc_paid":null,"fwci":3.6661,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.93332542,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"11","issue":"3","first_page":"1","last_page":"30"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9141861200332642},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6990929841995239},{"id":"https://openalex.org/keywords/overlay-multicast","display_name":"Overlay multicast","score":0.6730525493621826},{"id":"https://openalex.org/keywords/overlay-network","display_name":"Overlay network","score":0.6517755389213562},{"id":"https://openalex.org/keywords/overlay","display_name":"Overlay","score":0.6287380456924438},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5907114148139954},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5322572588920593},{"id":"https://openalex.org/keywords/multicast","display_name":"Multicast","score":0.4724569618701935},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.38495030999183655},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3352726697921753},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.25235307216644287},{"id":"https://openalex.org/keywords/reliable-multicast","display_name":"Reliable multicast","score":0.10400253534317017},{"id":"https://openalex.org/keywords/xcast","display_name":"Xcast","score":0.09841710329055786},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.09042736887931824}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9141861200332642},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6990929841995239},{"id":"https://openalex.org/C2780622806","wikidata":"https://www.wikidata.org/wiki/Q1331985","display_name":"Overlay multicast","level":5,"score":0.6730525493621826},{"id":"https://openalex.org/C169851745","wikidata":"https://www.wikidata.org/wiki/Q1331985","display_name":"Overlay network","level":3,"score":0.6517755389213562},{"id":"https://openalex.org/C136085584","wikidata":"https://www.wikidata.org/wiki/Q910289","display_name":"Overlay","level":2,"score":0.6287380456924438},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5907114148139954},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5322572588920593},{"id":"https://openalex.org/C32295351","wikidata":"https://www.wikidata.org/wiki/Q899288","display_name":"Multicast","level":2,"score":0.4724569618701935},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.38495030999183655},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3352726697921753},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.25235307216644287},{"id":"https://openalex.org/C174174714","wikidata":"https://www.wikidata.org/wiki/Q7310997","display_name":"Reliable multicast","level":4,"score":0.10400253534317017},{"id":"https://openalex.org/C192059732","wikidata":"https://www.wikidata.org/wiki/Q3823050","display_name":"Xcast","level":3,"score":0.09841710329055786},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.09042736887931824},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1341731.1341736","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1341731.1341736","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6700000166893005}],"awards":[{"id":"https://openalex.org/G287368133","display_name":null,"funder_award_id":"W911NF-05-1-0270","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G8797769007","display_name":null,"funder_award_id":"CNS-0524156CNS-0627382CAREER NSF-0643906","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8990108286","display_name":null,"funder_award_id":"CNS-0524156CNS-0627382CAREER NSF-0643906","funder_id":"https://openalex.org/F4320337388","funder_display_name":"Division of Computer and Network Systems"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320337388","display_name":"Division of Computer and Network Systems","ror":"https://ror.org/02rdzmk74"},{"id":"https://openalex.org/F4320338281","display_name":"Army Research Office","ror":"https://ror.org/05epdh915"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W1513557409","https://openalex.org/W1550619482","https://openalex.org/W1602892281","https://openalex.org/W1750553315","https://openalex.org/W1795810575","https://openalex.org/W1958859150","https://openalex.org/W1964929377","https://openalex.org/W1971513162","https://openalex.org/W2038564299","https://openalex.org/W2063354751","https://openalex.org/W2083408498","https://openalex.org/W2103810903","https://openalex.org/W2109055473","https://openalex.org/W2111038623","https://openalex.org/W2121243646","https://openalex.org/W2123040237","https://openalex.org/W2123479684","https://openalex.org/W2127280340","https://openalex.org/W2129807746","https://openalex.org/W2135980240","https://openalex.org/W2138370688","https://openalex.org/W2144553078","https://openalex.org/W2157918617","https://openalex.org/W2161099791","https://openalex.org/W2165482045","https://openalex.org/W2170496240","https://openalex.org/W2171340077","https://openalex.org/W3181862900","https://openalex.org/W4285719527","https://openalex.org/W4298134634"],"related_works":["https://openalex.org/W2126322057","https://openalex.org/W89955905","https://openalex.org/W1896173532","https://openalex.org/W2028088940","https://openalex.org/W2038469395","https://openalex.org/W1965229836","https://openalex.org/W2126533264","https://openalex.org/W1581030927","https://openalex.org/W1548688118","https://openalex.org/W2042060105"],"abstract_inverted_index":{"Overlay":[0],"multicast":[1],"networks":[2,31,171],"are":[3,32,49],"used":[4],"by":[5,38],"service":[6],"providers":[7],"to":[8,23,35,51,53,58,67,100,145],"distribute":[9],"contents":[10],"such":[11,30,60,102],"as":[12,172],"Web":[13],"pages,":[14],"static":[15],"and":[16,64,66,94,117,166,176,191,194],"streaming":[17],"multimedia":[18],"data,":[19],"or":[20,40,148],"security":[21],"updates":[22],"a":[24,114,123,136,141],"large":[25],"number":[26],"of":[27,91,129,162],"users.":[28],"However,":[29],"extremely":[33],"vulnerable":[34],"message-dropping":[36],"attacks":[37,61,103],"malicious":[39],"selfish":[41,149],"nodes":[42],"that":[43,119,180],"intentionally":[44],"drop":[45],"the":[46,70,76,105,110,163],"packets":[47],"they":[48],"required":[50],"forward":[52],"others.":[54],"It":[55],"is":[56],"difficult":[57],"detect":[59,101],"both":[62],"efficiently":[63],"effectively":[65],"further":[68],"identify":[69,146],"attackers,":[71],"especially":[72],"when":[73],"members":[74],"in":[75,104,127],"overlay":[77,106,164,170],"switch":[78],"between":[79],"online/offline":[80],"statuses":[81],"frequently.":[82],"In":[83,132],"this":[84],"article,":[85],"we":[86,139],"consider":[87],"various":[88],"attacking":[89],"strategies":[90],"an":[92,96],"attacker":[93],"propose":[95,140],"optimal":[97],"sampling-based":[98,125,142],"scheme":[99,121,126,144],"network.":[107],"We":[108],"analyze":[109],"detection":[111,130,190],"problem":[112],"from":[113],"game-theoretical":[115],"viewpoint":[116],"show":[118,179],"our":[120,155,186],"outperforms":[122],"random":[124],"terms":[128],"rate.":[131],"addition,":[133],"based":[134],"on":[135],"reputation":[137],"system,":[138],"path-resolving":[143],"compromised":[147],"nodes.":[150],"Unlike":[151],"other":[152],"existing":[153],"approaches,":[154],"schemes":[156,187],"do":[157],"not":[158],"assume":[159],"global":[160],"knowledge":[161],"hierarchy":[165],"work":[167],"for":[168],"dynamic":[169],"well.":[173],"Extensive":[174],"analysis":[175],"simulation":[177],"results":[178],"besides":[181],"being":[182],"band":[183],"width":[184],"efficient,":[185],"have":[188],"high":[189],"identification":[192],"rates":[193],"low":[195],"false-positive":[196],"rates.":[197]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
