Exact and heuristic algorithms for solving the generalized minimum filter placement problem

被引:3
作者
Mofya, E. Chisonge [1 ]
Smith, J. Cole [1 ]
机构
[1] Univ Arizona, Dept Syst & Ind Engn, Tucson, AZ 85721 USA
关键词
mixed-integer programming; facets; heuristics; computer network security; denial of service attacks;
D O I
10.1007/s10878-006-9631-2
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
We consider a problem of placing route-based filters in a communication network to limit the number of forged address attacks to a prescribed level. Nodes in the network communicate by exchanging packets along arcs, and the originating node embeds the origin and destination addresses within each packet that it sends. In the absence of a validation mechanism, one node can send packets to another node using a forged origin address to launch an attack against that node. Route-based filters can be established at various nodes on the communication network to protect against these attacks. A route-based filter examines each packet arriving at a node, and determines whether or not the origin address could be legitimate, based on the arc on which the packet arrives, the routing information, and possibly the destination. The problem we consider seeks to find a minimum cardinality subset of nodes to filter so that the prescribed level of security is achieved. We formulate a mixed-integer programming model for the problem and derive valid inequalities for this model by identifying polynomially-solvable subgraphs of the communication network. We also present three heuristics for solving the filter placement problem and evaluate their performance against the optimal solution provided by the mixed-integer programming model.
引用
收藏
页码:231 / 256
页数:26
相关论文
共 25 条
  • [1] Aljifri H., 2003, IEEE Security & Privacy, V1, P24, DOI 10.1109/MSECP.2003.1203219
  • [2] [Anonymous], 1979, Computers and Intractablity: A Guide to the Theoryof NP-Completeness
  • [3] ARMBRUSTER B, 2005, PACKET FILTER PLACEM
  • [4] IP traceback with deterministic packet marking
    Belenky, A
    Ansari, N
    [J]. IEEE COMMUNICATIONS LETTERS, 2003, 7 (04) : 162 - 164
  • [5] *CERT, 2000, ADV CA 2000 01 DEN O
  • [6] Defending against flooding-based distributed denial-of-service attacks: A tutorial
    Chang, RKC
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (10) : 42 - 51
  • [7] Characterization of defense mechanisms against distributed denial of service attacks
    Chen, LC
    Longstaff, TA
    Carley, KM
    [J]. COMPUTERS & SECURITY, 2004, 23 (08) : 665 - 678
  • [8] *CSI FBI, 2002, COMP CRIM SEC SURV
  • [9] *CSI FBI, 2004, COMP CRIM SEC SURV
  • [10] *CSI FBI, 2003, COMP CRIM SEC SURV