TY - JOUR
T1 - Stealthy DGoS Attack against Network Tomography
T2 - The Role of Active Measurements
AU - Chiu, Cho Chun
AU - He, Ting
N1 - Funding Information:
Manuscript received September 15, 2020; revised January 7, 2021; accepted March 28, 2021. Date of publication April 5, 2021; date of current version July 7, 2021. This work was supported by the National Science Foundation under Award CCF-1813219. Recommended for acceptance by Dr. Pan Zhou. (Corresponding author: Cho-Chun Chiu.) The authors are with the School of Electrical Engineering, and Computer Science, The Pennsylvania State University, University Park 16802-1503 USA (e-mail: cuc496@psu.edu; th.tinghe@gmail.com). Digital Object Identifier 10.1109/TNSE.2021.3070990
Publisher Copyright:
© 2013 IEEE.
PY - 2021/4/1
Y1 - 2021/4/1
N2 - As a tool to infer the internal state of a network that cannot be measured directly, network tomography has been extensively studied under the assumption that the measurements truthfully reflect the end-to-end performance of measurement paths, which makes the resulting solutions vulnerable to manipulated measurements. In this work, we investigate the impact of manipulated measurements via a recently proposed attack model called the stealthy DeGrading of Service (DGoS) attack, which aims at maximally degrading the performance of targeted paths without exposing the manipulated links to network tomography. While existing studies on this attack assumed that network tomography only measures the paths actively used for data transfer (via passive measurements), our model allows network tomography to measure a larger set of paths, e.g., by sending probes on some paths not carrying data flows. By developing and analyzing the optimal attack strategy, we quantify the maximum damage of such an attack. We further develop a defense strategy by formulating and solving a Stackelberg game to select the best set of measurement paths under a budget constraint. Our evaluations on real topologies validate the efficacy of the proposed defense strategy while identifying areas for further improvement.
AB - As a tool to infer the internal state of a network that cannot be measured directly, network tomography has been extensively studied under the assumption that the measurements truthfully reflect the end-to-end performance of measurement paths, which makes the resulting solutions vulnerable to manipulated measurements. In this work, we investigate the impact of manipulated measurements via a recently proposed attack model called the stealthy DeGrading of Service (DGoS) attack, which aims at maximally degrading the performance of targeted paths without exposing the manipulated links to network tomography. While existing studies on this attack assumed that network tomography only measures the paths actively used for data transfer (via passive measurements), our model allows network tomography to measure a larger set of paths, e.g., by sending probes on some paths not carrying data flows. By developing and analyzing the optimal attack strategy, we quantify the maximum damage of such an attack. We further develop a defense strategy by formulating and solving a Stackelberg game to select the best set of measurement paths under a budget constraint. Our evaluations on real topologies validate the efficacy of the proposed defense strategy while identifying areas for further improvement.
UR - http://www.scopus.com/inward/record.url?scp=85103876031&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85103876031&partnerID=8YFLogxK
U2 - 10.1109/TNSE.2021.3070990
DO - 10.1109/TNSE.2021.3070990
M3 - Article
AN - SCOPUS:85103876031
SN - 2327-4697
VL - 8
SP - 1745
EP - 1758
JO - IEEE Transactions on Network Science and Engineering
JF - IEEE Transactions on Network Science and Engineering
IS - 2
M1 - 9395253
ER -