Unit II - Security in Distributed Systems
Unit II - Security in Distributed Systems
in Distributed Systems
Importance
Overview
Attack on Availability
An attack that aims to make a service unavailable to legitimate users by overwhelming it with excessive requests.
Mitigation: Implement rate limiting, use firewalls, and deploy Distributed Denial of Service (DDoS) protection
services.
Example: A website becomes inaccessible because it is flooded with millions of fake requests in a DDoS attack.
Impersonation (Masquerading)
Attack on Authenticity
Pretending to be another user or
system to gain unauthorized access.
Mitigation: Strong authentication
mechanisms (e.g., multi-factor
authentication).
Example: A phishing attack where an
attacker impersonates a legitimate
website to steal user credentials.
Repudiation
Attack on Non-Repudiation
Denial by one of the parties in a communication
of having participated in all or part of the
communication.
Mitigation: Use of digital signatures and audit
logging.
Contracts - Legal / Third party entities help
resolve.
Example: A user denying that they sent a
particular email.