Defending Hash Tables from Subterfuge with Depth Charge

08/08/2023
by   Trisha Chakraborty, et al.
0

We consider the problem of defending a hash table against a Byzantine attacker that is trying to degrade the performance of query, insertion and deletion operations. Our defense makes use of resource burning (RB) – the the verifiable expenditure of network resources – where the issuer of a request incurs some RB cost. Our algorithm, Depth Charge, charges RB costs for operations based on the depth of the appropriate object in the list that the object hashes to in the table. By appropriately setting the RB costs, our algorithm mitigates the impact of an attacker on the hash table's performance. In particular, in the presence of a significant attack, our algorithm incurs a cost which is asymptotically less that the attacker's cost.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/19/2023

Efficient implementation of sets and multisets in R using hash tables

The package hset for the R language contains an implementation of a S4 c...
research
06/01/2020

DHash: Enabling Dynamic and Efficient Hash Tables

Given a specified average load factor, hash tables offer the appeal of c...
research
07/05/2019

HashGraph – Scalable Hash Tables Using A Sparse Graph Data Structure

Hash tables are ubiquitous and used in a wide range of applications for ...
research
04/20/2022

An Efficient Wait-free Resizable Hash Table

This paper presents an efficient wait-free resizable hash table. To achi...
research
09/21/2020

Information Signaling: A Counter-Intuitive Defense Against Password Cracking

We introduce password strength information signaling as a novel, yet cou...
research
06/26/2022

Cost-Asymmetric Memory Hard Password Hashing

In the past decade, billions of user passwords have been exposed to the ...
research
10/01/2020

Sort-based grouping and aggregation

Database query processing requires algorithms for duplicate removal, gro...

Please sign up or login with your details

Forgot password? Click here to reset