Minimally Intrusive Access Management to Content Delivery Networks based on Performance Models and Access Patterns
- URL: http://arxiv.org/abs/2410.05642v1
- Date: Tue, 8 Oct 2024 02:45:22 GMT
- Title: Minimally Intrusive Access Management to Content Delivery Networks based on Performance Models and Access Patterns
- Authors: Lenise M. V. Rodrigues, Daniel Sadoc Menasché, Arthur Serra, Antonio A. de Aragão Rocha,
- Abstract summary: This paper focuses on combating the misuse of tokens through performance analysis and statistical access patterns.
We propose the definition of acceptable request limits to detect and block abnormal accesses.
We also introduce countermeasures against piracy, such as degrading the quality of service for pirate users to discourage them from illegal sharing.
- Score: 0.4949816699298336
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: This paper presents an approach to managing access to Content Delivery Networks (CDNs), focusing on combating the misuse of tokens through performance analysis and statistical access patterns. In particular, we explore the impact of token sharing on the content delivery infrastructure, proposing the definition of acceptable request limits to detect and block abnormal accesses. Additionally, we introduce countermeasures against piracy, such as degrading the quality of service for pirate users to discourage them from illegal sharing, and using queuing models to quantify system performance in different piracy scenarios. Adopting these measures can improve the consistency and efficiency of CDN access and cost management, protecting the infrastructure and the legitimate user experience.
Related papers
- PWC-MoE: Privacy-Aware Wireless Collaborative Mixture of Experts [59.5243730853157]
Large language models (LLMs) hosted on cloud servers alleviate the computational and storage burdens on local devices but raise privacy concerns.<n>Small language models (SLMs) running locally enhance privacy but suffer from limited performance on complex tasks.<n>We propose a privacy-aware wireless collaborative mixture of experts (PWC-MoE) framework to balance computational cost, performance, and privacy protection under bandwidth constraints.
arXiv Detail & Related papers (2025-05-13T16:27:07Z) - Are You Getting What You Pay For? Auditing Model Substitution in LLM APIs [60.881609323604685]
Large Language Models (LLMs) accessed via black-box APIs introduce a trust challenge.
Users pay for services based on advertised model capabilities.
providers may covertly substitute the specified model with a cheaper, lower-quality alternative to reduce operational costs.
This lack of transparency undermines fairness, erodes trust, and complicates reliable benchmarking.
arXiv Detail & Related papers (2025-04-07T03:57:41Z) - DocMIA: Document-Level Membership Inference Attacks against DocVQA Models [52.13818827581981]
We introduce two novel membership inference attacks tailored specifically to DocVQA models.
Our methods outperform existing state-of-the-art membership inference attacks across a variety of DocVQA models and datasets.
arXiv Detail & Related papers (2025-02-06T00:58:21Z) - Provisioning Time-Based Subscription in NDN: A Secure and Efficient Access Control Scheme [21.55750158120826]
This paper proposes a novel encryption-based access control mechanism for Named Data Networking (NDN)
The scheme allows data producers to share their content in encrypted form before transmitting it to consumers.
It incorporates time-based subscription access policies directly into the encrypted content, enabling only consumers with valid subscriptions to decrypt it.
arXiv Detail & Related papers (2025-01-27T11:44:36Z) - MIETT: Multi-Instance Encrypted Traffic Transformer for Encrypted Traffic Classification [59.96233305733875]
Classifying traffic is essential for detecting security threats and optimizing network management.
We propose a Multi-Instance Encrypted Traffic Transformer (MIETT) to capture both token-level and packet-level relationships.
MIETT achieves results across five datasets, demonstrating its effectiveness in classifying encrypted traffic and understanding complex network behaviors.
arXiv Detail & Related papers (2024-12-19T12:52:53Z) - Securing RC Based P2P Networks: A Blockchain-based Access Control Framework utilizing Ethereum Smart Contracts for IoT and Web 3.0 [0.12499537119440242]
This paper presents a blockchain-based access control framework that uses smart contracts to address these challenges.
Our framework aims to close the gaps in existing access control systems by providing flexible, transparent, and decentralized security solutions.
arXiv Detail & Related papers (2024-12-04T20:56:52Z) - TabSec: A Collaborative Framework for Novel Insider Threat Detection [8.27921273043059]
In the era of the Internet of Things (IoT) and data sharing, users frequently upload their personal information to enterprise databases to enjoy enhanced service experiences.
However, the widespread presence of system vulnerabilities, remote network intrusions, and insider threats significantly increases the exposure of private enterprise data on the internet.
This paper proposes a novel threat detection framework, TabITD, to address these challenges.
arXiv Detail & Related papers (2024-11-04T04:07:16Z) - SPOQchain: Platform for Secure, Scalable, and Privacy-Preserving Supply Chain Tracing and Counterfeit Protection [46.68279506084277]
This work proposes SPOQchain, a novel blockchain-based platform that provides comprehensive traceability and originality verification.
It provides an analysis of privacy and security aspects, demonstrating the need and qualification of SPOQchain for the future of supply chain tracing.
arXiv Detail & Related papers (2024-08-30T07:15:43Z) - Evaluating Copyright Takedown Methods for Language Models [100.38129820325497]
Language models (LMs) derive their capabilities from extensive training on diverse data, including potentially copyrighted material.
This paper introduces the first evaluation of the feasibility and side effects of copyright takedowns for LMs.
We examine several strategies, including adding system prompts, decoding-time filtering interventions, and unlearning approaches.
arXiv Detail & Related papers (2024-06-26T18:09:46Z) - "Glue pizza and eat rocks" -- Exploiting Vulnerabilities in Retrieval-Augmented Generative Models [74.05368440735468]
Retrieval-Augmented Generative (RAG) models enhance Large Language Models (LLMs)
In this paper, we demonstrate a security threat where adversaries can exploit the openness of these knowledge bases.
arXiv Detail & Related papers (2024-06-26T05:36:23Z) - FACOS: Enabling Privacy Protection Through Fine-Grained Access Control with On-chain and Off-chain System [11.901770945295391]
We propose a permissioned blockchain-based privacy-preserving fine-grained access control on-chain and off-chain system, namely FACOS.
Compared to similar work that only stores encrypted data in centralized or non-fault-tolerant IPFS systems, we enhanced off-chain data storage security and robustness.
arXiv Detail & Related papers (2024-06-06T02:23:12Z) - Private Online Community Detection for Censored Block Models [60.039026645807326]
We study the private online change detection problem for dynamic communities, using a censored block model (CBM)
We propose an algorithm capable of identifying changes in the community structure, while maintaining user privacy.
arXiv Detail & Related papers (2024-05-09T12:35:57Z) - Practically adaptable CPABE based Health-Records sharing framework [0.0]
We have suggested a CPABE and OAuth2.0 based framework for efficient access-control and authorization respectively to improve the practicality of EHR sharing across a single client-application.
Our implementation of the suggested framework along with its analytical comparison signifies its potential in terms of efficient performance and minimal latency.
arXiv Detail & Related papers (2024-03-11T00:23:17Z) - Resource-Aware Hierarchical Federated Learning in Wireless Video Caching Networks [24.664469755746463]
Backhaul traffic congestion caused by the video traffic of a few popular files can be alleviated by storing the to-be-requested content.
We propose a novel resource-aware hierarchical federated learning (RawHFL) solution for predicting user's future content requests.
arXiv Detail & Related papers (2024-02-06T18:17:02Z) - A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - Deep Learning meets Blockchain for Automated and Secure Access Control [0.0]
We propose DLACB, a Deep Learning Based Access Control Using, as a solution to decentralized access control.
DLACB uses blockchain to provide transparency, traceability, and reliability in various domains such as medicine, finance, and government.
As all data is recorded on the blockchain, we have the capability to identify malicious activities.
arXiv Detail & Related papers (2023-11-10T18:50:56Z) - Having your Privacy Cake and Eating it Too: Platform-supported Auditing
of Social Media Algorithms for Public Interest [70.02478301291264]
Social media platforms curate access to information and opportunities, and so play a critical role in shaping public discourse.
Prior studies have used black-box methods to show that these algorithms can lead to biased or discriminatory outcomes.
We propose a new method for platform-supported auditing that can meet the goals of the proposed legislation.
arXiv Detail & Related papers (2022-07-18T17:32:35Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.