Protection of flows under targeted attacks
نویسندگان
چکیده
Due to the importance of robustness in many real-world optimization problems, the field of robust optimization has gained a lot of attention over the past decade. We concentrate on maximum flow problems and introduce a novel robust optimization model which, compared to known models from the literature, features several advantageous properties: (i) We consider a general class of path-based flow problems which can be used to model a large variety of network routing problems (and other packing problems). (ii) We aim at solutions that are robust against targeted attacks by a potent adversary who may attack any flow path of his choice on any edge of the network. (iii) In contrast to previous robust maximum flow models, for which no efficient algorithms are known, optimal robust flows for the most important basic variants of our model can be found in polynomial time. We also consider generalizations where the flow player can spend a budget to protect the network against the interdictor. Here, we show that the problem can be solved efficiently when the interdic-tion costs are determined by the flow player from scratch. However, the problem becomes hard to approximate when the flow player has to improve an initial protection infrastructure. 1. Introduction. Network flow problems form one of the most important classes of optimization problems with numerous real-world applications, e. g., in production systems, logistics, and communication networks. The increasing dependence of our society on constant availability of such network services motivates the study of new flow models that are robust against unforeseen interferences, link failures, and targeted attacks by external forces. The theory of robust optimization offers various techniques to handle the issue of planning in face of uncertainties and unreliability; see, e. g., [4, 5] for surveys. A general idea is to model uncertainty by a set of possible scenarios Ω that is specified along with the instance of the optimization problem under consideration, where each scenario represents a possible outcome involving failures in the infrastructure, intentional sabotage, or similar complications. With respect to a worst-case analysis, the robust objective value of a feasible solution x is the worst objective value of x among all possible scenarios z ∈ Ω. Robust optimization can thus be interpreted as a two-player game: the first player (" the decision-maker ") chooses a solution x from a set X of feasible solutions to the underlying " nominal " optimization problem. Afterwards, …
منابع مشابه
An Efficient Response Time for Shrew Attack Protection in Mitigating Low-Rate Tcp- Targeted Attacks
-This paper presents a simple prioritytagging filtering mechanism, called SAP (Shrew Attack Protection), which protects well-behaved TCP flows against low-rate TCP-targeted Shrew attacks. In this scheme, a router maintains a simple set of counters and keeps track of the drop rate for each potential victim. If the monitored drop rates are low, all packets are treated as normal and equally comple...
متن کاملProgram Counter Encoding for ARM® Architecture
ARM® is the prevalent processor architecture for embedded and mobile applications. For the smartphones, it is the processor for which software applications are running, whether the platform is with Apple’s iOS or Google’s Android. Software operations under these platforms are prone to semantic gap, which refers to potential difference between intended operations described in software and actual...
متن کاملLow-Rate TCP-Targeted DoS Attack Disrupts Internet Routing
Compared to attacks against end hosts, Denial of Service (DoS) attacks against the Internet infrastructure such as those targeted at routers can be more devastating due to their global impact on many networks. We discover that the recently identified low-rate TCP-targeted DoS attacks can have severe impact on the Border Gateway Protocol (BGP). As the interdomain routing protocol on today’s Inte...
متن کاملMarketNet: Market-Based Protection of Network Systems and Services - An Application to SNMP Protection
This research is sponsored in part by the USAF, Air Force Materiel Command, under contract F30602-97-1-0252, "MarketNet: A Survivable, Market-based Architecture for Large-scale Information Systems", and in part by the New York Science and Technology Foundation, subcontract with Polytechnic University. The views and conclusions contained in this document are those of the authors and should not b...
متن کاملExploit Dynamic Data Flows to Protect Software Against Semantic Attacks
Unauthorized code modification based on reverse engineering is a serious threat for software industry. Virtual machine based code obfuscation is emerging as a powerful technique for software protection. However, the current code obfuscation techniques are vulnerable under semantic attacks which use dynamic profiling to transform an obfuscated program to construct a simpler program that is funct...
متن کاملTheoretical and Computational Evaluation of the Use of Molecular Nanoelectronic Technology in Targeted Monitoring of Electrical Brain Waves to Predict Some Neuro-cerebral Attacks
Abstract Background and Objectives: Today, it is expected that by using molecular nanoelectronic, the symptoms emitted from neurons will be studied. Many studies show that abnormalities in the normal functioning of brain cells can lead to neurological attacks. One of the most common brain system defects is epileptic seizures. In this case, due to the electrical discharge of a group of neurons,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Oper. Res. Lett.
دوره 45 شماره
صفحات -
تاریخ انتشار 2017