Attack Propagation in Networks

被引:0
|
作者
Sotiris Nikoletseas
Grigorios Prasinos
Paul Spirakis
Christos Zaroliagis
机构
[1] Computer Technology Institute and Department of Computer Engineering and Informatics,
[2] University of Patras,undefined
[3] 26500 Patras,undefined
来源
Theory of Computing Systems | 2003年 / 36卷
关键词
Active Node; Virtual Channel; Virtual Link; Successful Attack; Attack Scheme;
D O I
暂无
中图分类号
学科分类号
摘要
A new model for intrusion and its propagation through various attack schemes in networks is considered. The model is characterized by the number of network nodes n, and two parameters f and g. Parameter f represents the probability of failure of an attack to a node and is a gross measure of the level of security of the attacked system and perhaps of the intruder’s skills; g represents a limit on the number of attacks that the intrusion software can ever try, due to the danger of being discovered, when it issues them from a particular (broken) network node. The success of the attack scheme is characterized by two factors: the number of nodes captured (the spread factor) and the number of virtual links that a defense mechanism has to trace from any node where the attack is active to the origin of the intrusion (the traceability factor). The goal of an intruder is to maximize both factors. In our model we present four different ways (attack schemes) by which an intruder can organize his attacks. Using analytic and experimental methods, we first show that for any 0 < f < 1, there exists a constant g for which any of our attack schemes can achieve a Θ(n) spread and traceability factor with high probability, given sufficient propagation time. We also show for three of our attack schemes that the spread and the traceability factors are, with high probability, linearly related during the whole duration of the attack propagation. This implies that it will not be easy for a detection mechanism to trace the origin of the intrusion, since it will have to trace a number of links proportional to the nodes captured.
引用
收藏
页码:553 / 574
页数:21
相关论文
共 50 条
  • [1] Attack propagation in networks
    Nikoletseas, S
    Prasinos, G
    Spirakis, P
    Zaroliagis, C
    THEORY OF COMPUTING SYSTEMS, 2003, 36 (05) : 553 - 574
  • [2] Propagation of all-optical crosstalk attack in transparent optical networks
    Peng, Yunfeng
    Sun, Zeyu
    Du, Shu
    Long, Keping
    OPTICAL ENGINEERING, 2011, 50 (08)
  • [3] Risk Propagation Model of Power Coupled Networks Under Malicious Attack
    Wu Z.
    Du W.
    Liu L.
    Lin Y.
    Liu J.
    Dianwang Jishu/Power System Technology, 2020, 44 (06): : 2045 - 2052
  • [4] Adversarial Label Poisoning Attack on Graph Neural Networks via Label Propagation
    Liu, Ganlin
    Huang, Xiaowei
    Yi, Xinping
    COMPUTER VISION - ECCV 2022, PT V, 2022, 13665 : 227 - 243
  • [5] Propagation Effect of High-powered Jamming Attack in Transparent Optical Networks
    Sun Zeyu
    Peng Yunfeng
    Long Keping
    NETWORK ARCHITECTURES, MANAGEMENT, AND APPLICATIONS IX, 2011, 8310
  • [6] Propagation Effect of High-powered Jamming Attack in Transparent Optical Networks
    Sun Zeyu
    Peng Yunfeng
    Long Keping
    2011 ASIA COMMUNICATIONS AND PHOTONICS CONFERENCE AND EXHIBITION (ACP), 2012,
  • [7] Attack propagation of high-powered intrachannel crosstalk in transparent optical networks
    Sun, Zeyu
    Peng, Yunfeng
    Long, Keping
    OPTICAL ENGINEERING, 2011, 50 (10)
  • [8] SPARTA: Signal Propagation-based Attack Recognition and Threat Avoidance for Automotive Networks
    Schell, Oleg
    Kneib, Marcel
    PROCEEDINGS OF THE 2023 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ASIA CCS 2023, 2023, : 760 - 772
  • [9] Sparse power equalization placement for limiting jamming attack propagation in transparent optical networks
    Jirattigalachote, Amornrat
    Skorin-Kapov, Nina
    Furdek, Marija
    Chen, Jiajia
    Monti, Paolo
    Wosinska, Lena
    OPTICAL SWITCHING AND NETWORKING, 2011, 8 (04) : 249 - 258
  • [10] Sybil Attack Resilient Traffic Networks: A Physics-Based Trust Propagation Approach
    Shoukry, Yasser
    Mishra, Shaunak
    Luo, Zutian
    Diggavi, Suhas
    2018 9TH ACM/IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS (ICCPS 2018), 2018, : 43 - 54