Abstract
A random beacon periodically outputs a random number and was introduced by Rabin [12] to secure remote transaction. We consider a random beacon that is pervasive in the sense that, it is available everywhere, and accesses to the beacon blends with normal activities. With a pervasive beacon, it is difficult to disrupt the beacon and detect accesses to it. As a result, the pervasiveness of the beacon can facilitate covert coordination, whereby a large collection of agents covertly decide on a common action. In this paper, we discuss the desirable properties of a pervasive random beacon which can be used for covert coordination, and describe how such a beacon can be found in the Internet based on major stock market indices closing values. We also investigate how such a covert coordination can be used, in particular, in coordinating distributed denial of service (DDoS) attacks. Finally, we explore ways to, in a limited manner, disrupt the beacon.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Aumann, Y., Rabin, M.O.: Information theoretically secure communication in the limited storage space model. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 65–79. Springer, Heidelberg (1999)
Bennett, C.H., Di Vincenzo, D.P., Linsker, R.: Digital recording system with time-bracketed authentication by on-line challenges and method for authenticating recordings. US Patent 5764769 (1998)
Bennett, C.H., Smolin, J.A.: Trust enhancement by multiple random beacons. The Computing Research Repository(CoRR) cs.CR/0201003 (2002), http://xxx.lanl.gov/archive/cs/intro.html
Copley, D., Hassell, R., Jack, B., Lynn, K., Permeh, R., Soeder, D.: Blaster worm analysis. eEye Digital Security (2003), http://www.eeye.com/
Eastlake, D.E.: Rfc 2777: Publicly verifiable nomcom random selection. Internet RFC/STD/FYI/BCP Archives (2000)
Maurer, U.M.: Conditionally-perfect secrecy and a provably secure randomized cipher. Journal of Cryptology 5, 53–66 (1992)
Messmer, E.: Update: Blaster worm infections spreading rapidly. Network World Fusion (2003), http://www.nwfusion.com/
Mirkovic, J., Reiher, P.: A taxonomy of ddos attack and ddos defense mechanisms. ACM SIGCOMM Computer Communications Review 34(2), 39–54 (2004)
Morein, W.G., Stavrou, A., Cook, D.L., Keromytis, A.D., Misra, V., Rubenstein, D.: Using graphic turing tests to counter automated ddos attacks against web servers. 10th ACM Int. Conf. on Computer and Communications Security, pp. 8–19 (2003)
Mossel, E., O’Donnell, R.: Coin flipping from a cosmic source: On error correction of truly random bits. To appear in Random Structures and Algorithms (2004)
Permeh, R., Maiffret, M.: Ida “code red” worm analysis. eEye Digital Security (2001), http://www.eeye.com/
Rabin, M.O.: Transaction protection by beacons. J. Computer and System Sciences 27(2), 256–267 (1983)
von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: Captcha: Using hard ai problems for security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 294–311. Springer, Heidelberg (2003)
Walker, J.: ent. Fourmilab Switzerland (1998), http://www.fourmilab.ch/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, H.H., Chang, EC., Chan, M.C. (2005). Pervasive Random Beacon in the Internet for Covert Coordination. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds) Information Hiding. IH 2005. Lecture Notes in Computer Science, vol 3727. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11558859_5
Download citation
DOI: https://doi.org/10.1007/11558859_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29039-1
Online ISBN: 978-3-540-31481-3
eBook Packages: Computer ScienceComputer Science (R0)