Evaluating Network Boolean Tomography under Byzantine Attacks

被引:0
作者
Deng, Haotian [1 ]
Pan, Shengli [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
来源
IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM | 2023年
基金
中国国家自然科学基金;
关键词
network boolean tomography; congested link identification; end-to-end measurement; Byzantine attacks;
D O I
10.1109/GLOBECOM54140.2023.10436865
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
It is vital to closely track the operation statuses of network-internal links. Accurate knowledge of the operation statuses of network-internal links is vital for the management of many networks like the Internet, the satellite communication network, etc. Network boolean tomography can identify congested links just using end-to-end path status observations, and is able to work efficiently even without any available cooperation of internal nodes. Nevertheless, it heavily assumes that all the path status observations collected are true while some Byzantine attacks, e.g., the label flip attacks, could violate this assumption. In this paper, we present a performance evaluation of network boolean tomography under Byzantine attacks. Our results against various attacking rates, locations, and scales all show that Byzantine attacks could cause a significant performance degradation of network boolean tomography, suggesting a pressing need of developing the detection and countermeasure techniques.
引用
收藏
页码:7574 / 7579
页数:6
相关论文
共 17 条
[1]   On Fundamental Bounds on Failure Identifiability by Boolean Network Tomography [J].
Bartolini, Novella ;
He, Ting ;
Arrigoni, Viviana ;
Massini, Annalisa ;
Trombetti, Federico ;
Khamfroush, Hana .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2020, 28 (02) :588-601
[2]  
Chen JB, 2014, IEEE ICC, P1278, DOI 10.1109/ICC.2014.6883497
[3]   Stealthy DGoS Attack: DeGrading of Service Under the Watch of Network Tomography [J].
Chiu, Cho-Chun ;
He, Ting .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2021, 29 (03) :1294-1307
[4]   A Churn for the Beter Localizing Censorship using Network-level Path Churn and Network Tomography [J].
Cho, Shinyoung ;
Nithyanand, Rishab ;
Razaghpanah, Abbas ;
Gill, Phillipa .
CONEXT'17: PROCEEDINGS OF THE 2017 THE 13TH INTERNATIONAL CONFERENCE ON EMERGING NETWORKING EXPERIMENTS AND TECHNOLOGIES, 2017, :81-87
[5]  
CrowdStrike, 2023, 2023 Global threat report
[6]   Network tomography of binary network performance characteristics [J].
Duffield, Nick .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (12) :5373-5388
[7]  
He T., 2018, ACM SIGMETRICS PERFO, V45, P29
[8]   Combating Adversarial Network Topology Inference by Proactive Topology Obfuscation [J].
Hou, Tao ;
Wang, Tao ;
Lu, Zhuo ;
Liu, Yao .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2021, 29 (06) :2779-2792
[9]   Network Tomography based on Adaptive Measurements in Probabilistic Routing [J].
Ikeuchi, Hiroki ;
Saito, Hiroshi ;
Matsuda, Kotaro .
IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2022), 2022, :2148-2157
[10]  
Jaggard Aaron D., 2013, Performance Evaluation Review, V41, P105