Exact and approximation algorithms for sensor placement against DDoS attacks

In a DDoS attack (Distributed Denial of Service), an attacker gains control of many network users through a virus. Then the controlled users send many requests to a victim, leading to its resources being depleted. DDoS attacks are hard to defend because of their distributed nature, large scale and various attack techniques. One possible mode of defense is to place sensors in a network that can detect and stop an unwanted request. However, such sensors are expensive so there is a natural question as to the minimum number of sensors and the optimal placement required to get the necessary level of safety. Presented below are two mixed integer models for optimal sensor placement against DDoS attacks. Both models lead to a trade-off between the number of deployed sensors and the volume of uncontrolled flow. Since the above placement problems are NP-hard, two efficient heuristics are designed, implemented and compared experimentally with exact mixed integer linear programming solvers.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/28/2018

Sensor and Sink Placement, Scheduling and Routing Algorithms for Connected Coverage of Wireless Sensor Networks

A sensor is a small electronic device which has the ability to sense, co...
research
03/26/2022

Preventing Outages under Coordinated Cyber-Physical Attack with Secured PMUs

Due to the potentially severe consequences of coordinated cyber-physical...
research
05/30/2023

Optimal Hub Placement and Deadlock-Free Routing for Payment Channel Network Scalability

As a promising implementation model of payment channel network (PCN), pa...
research
10/25/2022

Net Separation-Oriented Printed Circuit Board Placement via Margin Maximization

Packaging has become a crucial process due to the paradigm shift of More...
research
06/09/2015

Adversarial patrolling with spatially uncertain alarm signals

When securing complex infrastructures or large environments, constant su...
research
12/02/2020

Defending against Contagious Attacks on a Network with Resource Reallocation

In classic network security games, the defender distributes defending re...
research
08/03/2023

Subspace-Constrained Continuous Methane Leak Monitoring and Optimal Sensor Placement

This work presents a procedure that can quickly identify and isolate met...

Please sign up or login with your details

Forgot password? Click here to reset