Show simple item record

dc.contributor.advisorEytan Modiano.en_US
dc.contributor.authorFu, Xinzhe.en_US
dc.contributor.otherMassachusetts Institute of Technology. Department of Aeronautics and Astronautics.en_US
dc.date.accessioned2019-10-04T21:33:05Z
dc.date.available2019-10-04T21:33:05Z
dc.date.copyright2019en_US
dc.date.issued2019en_US
dc.identifier.urihttps://hdl.handle.net/1721.1/122412
dc.descriptionThesis: S.M., Massachusetts Institute of Technology, Department of Aeronautics and Astronautics, 2019en_US
dc.descriptionCataloged from PDF version of thesis.en_US
dc.descriptionIncludes bibliographical references (pages 107-110).en_US
dc.description.abstractA network flow-based attack refers to a cyber-attack where the adversary seeks to block user traffic from transmission by sending adversarial traffic that reduces the available user capacity. In this thesis, we explore the fundamental limits of network flow attacks by investigating its feasibility region defined by the minimum resource required for a successful attack and designing optimal attacking strategies that achieve the feasibility region. First, we consider the case where the target network uses fixed-path routing and the adversary injects traffic into the network, encroaching the capacity of the network links and thus reducing the capacity available to network users on the fixed paths. We propose a new network interdiction paradigm that captures this phenomenon by modeling the network as a capacitated graph with the user throughput given by the max-flow value on the fixed user paths.en_US
dc.description.abstractThe adversary injects interdicting flows that reduces the capacity of the links (and hence the user throughput), and seeks to maximize the throughput reduction caused by the adversarial injection under a given flow budget. We show the NP-hardness of the problem of maximizing throughput reduction, and propose an efficient approximation algorithm that yields near optimal interdicting flows within a logarithmic factor by harnessing the submodularity of the problem. We further extend the algorithm to an approximation framework that can deal with the situation where the adversary does not have deterministic knowledge of the set of user paths but aims to maximize the worst case throughput reduction given that the set of user paths lies in certain collection of paths. Next, we turn to the scenario where the target network employs dynamic routing mechanisms such as Join-the-Shortest-Queue (JSQ) or Max-Weight.en_US
dc.description.abstractWe start from single-hop server farm under JSQ routing, where the adversary attacks by injecting adversarial traffic to servers with the objective of blocking user traffic, i.e., causing user traffic to experience unbounded delay. We first characterize the feasibility region of the attack by presenting a necessary and sufficient condition on the rate of adversarial traffic rate for the attack to be successful. We then propose an adversarial injection policy that is, (i) optimal: it achieves a successful attack whenever the adversarial traffic rate is inside the feasibility region and (ii) oblivious: it does not rely on any knowledge of the network statistics. We further evaluate the performance of the injection policy. Finally, we extend our results to multi-hop.network employing Max-Weight routing.en_US
dc.description.statementofresponsibilityby Xinzhe Fu.en_US
dc.format.extent110 pagesen_US
dc.language.isoengen_US
dc.publisherMassachusetts Institute of Technologyen_US
dc.rightsMIT theses are protected by copyright. They may be viewed, downloaded, or printed from this source but further reproduction or distribution in any format is prohibited without written permission.en_US
dc.rights.urihttp://dspace.mit.edu/handle/1721.1/7582en_US
dc.subjectAeronautics and Astronautics.en_US
dc.titleFundamental limit of network flow attacksen_US
dc.typeThesisen_US
dc.description.degreeS.M.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Aeronautics and Astronauticsen_US
dc.identifier.oclc1119730776en_US
dc.description.collectionS.M. Massachusetts Institute of Technology, Department of Aeronautics and Astronauticsen_US
dspace.imported2019-10-04T21:33:04Zen_US
mit.thesis.degreeMasteren_US
mit.thesis.departmentAeroen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record