Show simple item record

dc.contributor.authorFu, Xinzhe.
dc.contributor.authorModiano, Eytan H
dc.date.accessioned2020-07-21T18:37:35Z
dc.date.available2020-07-21T18:37:35Z
dc.date.issued2019-04
dc.date.submitted2019-01
dc.identifier.isbn9781728105154
dc.identifier.urihttps://hdl.handle.net/1721.1/126285
dc.description.abstractTraditional network interdiction refers to the problem of an interdictor trying to reduce the throughput of network users by removing network edges. In this paper, we propose a new paradigm for network interdiction that models scenarios, such as stealth DoS attack, where the interdiction is performed through injecting adversarial traffic flows. Under this paradigm, we first study the deterministic flow interdiction problem, where the interdictor has perfect knowledge of the operation of network users. We show that the problem is highly inapproximable on general networks and is NP-hard even when the network is acyclic. We then propose an algorithm that achieves a logarithmic approximation ratio and quasi-polynomial time complexity for acyclic networks through harnessing the submodularity of the problem. Next, we investigate the robust flow interdiction problem, which adopts the robust optimization framework to capture the case where definitive knowledge of the operation of network users is not available. We design an approximation framework that integrates the aforementioned algorithm, yielding a quasi-polynomial time procedure with poly-logarithmic approximation ratio for the more challenging robust flow interdiction. Finally, we evaluate the performance of the proposed algorithms through simulations, showing that they can be efficiently implemented and yield near-optimal solutions.en_US
dc.description.sponsorshipUnited States. Defense Threat Reduction Agency (Grant HDTRA1-13-1-0021)en_US
dc.description.sponsorshipUnited States. Defense Threat Reduction Agency (Grant HDTRA1-14-1-0058)en_US
dc.description.sponsorshipNational Science Foundation (U.S.) (Grant CNS-1735463)en_US
dc.language.isoen
dc.publisherIEEEen_US
dc.relation.isversionof10.1109/INFOCOM.2019.8737475en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alikeen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/en_US
dc.sourceMIT web domainen_US
dc.titleNetwork Interdiction Using Adversarial Traffic Flowsen_US
dc.typeArticleen_US
dc.identifier.citationFu, Xinzhe and Eytan Modiano. “Network Interdiction Using Adversarial Traffic Flows.” IEEE INFOCOM 2019, Paris, April 29-May 2, 2019, IEEE © 2019 The Author(s)en_US
dc.contributor.departmentMassachusetts Institute of Technology. Laboratory for Information and Decision Systemsen_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Aeronautics and Astronauticsen_US
dc.relation.journalIEEE INFOCOM 2019en_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dc.date.updated2019-10-30T16:51:09Z
dspace.date.submission2019-10-30T16:51:13Z
mit.journal.volume2019en_US
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record