TY - GEN
T1 - Stealthy DGoS Attack
T2 - 38th IEEE Conference on Computer Communications, INFOCOM 2020
AU - Chiu, Cho Chun
AU - He, Ting
N1 - Funding Information:
Research was sponsored by NSF under Award Number 1813219.
Publisher Copyright:
© 2020 IEEE.
PY - 2020/7
Y1 - 2020/7
N2 - Network tomography is a powerful tool to monitor the internal state of a closed network that cannot be measured directly, with broad applications in the Internet, overlay networks, and all-optical networks. However, existing network tomography solutions all assume that the measurements are trust-worthy, leaving open how effective they are in an adversarial environment with possibly manipulated measurements. To understand the fundamental limit of network tomography in such a setting, we formulate and analyze a novel type of attack that aims at maximally degrading the performance of targeted paths without being localized by network tomography. By analyzing properties of the optimal attack, we formulate novel combinatorial optimizations to design the optimal attack strategy, which are then linked to well-known problems and approximation algorithms. Our evaluations on real topologies demonstrate the large damage of such attacks, signaling the need of new defenses.
AB - Network tomography is a powerful tool to monitor the internal state of a closed network that cannot be measured directly, with broad applications in the Internet, overlay networks, and all-optical networks. However, existing network tomography solutions all assume that the measurements are trust-worthy, leaving open how effective they are in an adversarial environment with possibly manipulated measurements. To understand the fundamental limit of network tomography in such a setting, we formulate and analyze a novel type of attack that aims at maximally degrading the performance of targeted paths without being localized by network tomography. By analyzing properties of the optimal attack, we formulate novel combinatorial optimizations to design the optimal attack strategy, which are then linked to well-known problems and approximation algorithms. Our evaluations on real topologies demonstrate the large damage of such attacks, signaling the need of new defenses.
UR - http://www.scopus.com/inward/record.url?scp=85090295664&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85090295664&partnerID=8YFLogxK
U2 - 10.1109/INFOCOM41043.2020.9155344
DO - 10.1109/INFOCOM41043.2020.9155344
M3 - Conference contribution
AN - SCOPUS:85090295664
T3 - Proceedings - IEEE INFOCOM
SP - 367
EP - 376
BT - INFOCOM 2020 - IEEE Conference on Computer Communications
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 6 July 2020 through 9 July 2020
ER -