A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
The lotus-eater attack
2008
Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing - PODC '08
Many protocols for distributed and peer-to-peer systems have the feature that nodes will stop providing service for others once they have received a certain amount of service. Examples include BitTorent's unchoking policy, BAR Gossip's balanced exchanges, and threshold strategies in scrip systems. An attacker can exploit this by providing service in a targeted way to prevent chosen nodes from providing service. While such attacks cannot be prevented, we discuss techniques that can be used to
doi:10.1145/1400751.1400853
dblp:conf/podc/KashFH08
fatcat:lvm53bbctrfsrf7kltoas3i3ry