Didn't find any results in this catalog!
But we have some results in other catalogs.displaying 1000 best results Help
Search results for: NODE-TARGETED ATTACKS
-
Min-max optimization of node‐targeted attacks in service networks
PublicationThis article considers resilience of service networks that are composed of service and control nodes to node-targeted attacks. Two complementary problems of selecting attacked nodes and placing control nodes reflect the interaction between the network operator and the network attacker. This interaction can be analyzed within the framework of game theory. Considering the limited performance of the previously introduced iterative...
-
Optimizing primary and backup SDN controllers' placement resilient to node-targeted attacks
Publication -
On joint primary and backup controllers’ placement optimization against node-targeted attacks
Publication -
Maximizing SDN resilience to node‐targeted attacks through joint optimization of the primary and backup controllers placements
PublicationIn Software Defined Networks (SDN) packet data switches are configured by a limited number of SDN controllers, which respond to queries for packet forwarding decisions from the switches. To enable optimal control of switches in real time the placement of controllers at network nodes must guarantee that the controller-to-controller and switch-to-controller communications delays are bounded. Apart from the primary controllers that...
-
Using Probabilistic Availability Measures for Predicting Targeted Attacks on Network Nodes
Publication -
Network Protection Against Node Attacks Based on Probabilistic Availability Measures
Publication -
Assessment of Connectivity-based Resilience to Attacks Against Multiple Nodes in SDNs
PublicationIn Software Defined Networks (SDNs), the control plane of a network is decoupled from its data plane. For scalability and robustness, the logically centralized control plane is implemented by physically placing different controllers throughout the network. The determination of the number and placement of controllers is known as the Controller Placement Problem (CPP). In the regular (i.e., failure-free) state, the control plane...
-
Distributed protection against non-cooperative node behavior in multi-hop wireless networks
PublicationAn important security problem in today's distributed data networks is the prevention of non-cooperative behavior i.e., attacks consisting in the modification of standard node operation to gain unfair advantage over other system nodes. Such a behavior is currently feasible in many types of computer networks whose communication protocols are designed to maximize the network performance assuming full node cooperation. Moreover, it...
-
Improving the Survivability of Carrier Networks to Large-Scale Disasters
PublicationThis chapter is dedicated to the description of methods aiming to improve the survivability of carrier networks to large-scale disasters. First, a disaster classification and associated risk analysis is described, and the disaster-aware submarine fibre-optic cable deployment is addressed aiming to minimize the expected costs in case of natural disasters. Then, the chapter addresses the improvement of the network connectivity resilience...
-
Mitigating Traffic Remapping Attacks in Autonomous Multi-hop Wireless Networks
PublicationMultihop wireless networks with autonomous nodes are susceptible to selfish traffic remapping attacks (TRAs). Nodes launching TRAs leverage the underlying channel access function to receive an unduly high Quality of Service (QoS) for packet flows traversing source-to-destination routes. TRAs are easy to execute, impossible to prevent, difficult to detect, and harmful to the QoS of honest nodes. Recognizing the need for providing...