6th International ICST Symposium on Modeling and Optimization

Research Article

Linear Programming Models for Jamming Attacks on Network Traffic Flows

Download601 downloads
  • @INPROCEEDINGS{10.4108/ICST.WIOPT2008.3170,
        author={Patrick Tague and David Slater and Radha Poovendran and Guevara Noubir},
        title={Linear Programming Models for Jamming Attacks on Network Traffic Flows},
        proceedings={6th International ICST Symposium on Modeling and Optimization},
        publisher={IEEE},
        proceedings_a={WIOPT},
        year={2008},
        month={8},
        keywords={Centralized control  Computer crime  Information security  Jamming  Linear programming  Protocols  Spread spectrum communication  Telecommunication traffic Traffic control US Government},
        doi={10.4108/ICST.WIOPT2008.3170}
    }
    
  • Patrick Tague
    David Slater
    Radha Poovendran
    Guevara Noubir
    Year: 2008
    Linear Programming Models for Jamming Attacks on Network Traffic Flows
    WIOPT
    IEEE
    DOI: 10.4108/ICST.WIOPT2008.3170
Patrick Tague1,*, David Slater1,*, Radha Poovendran1,*, Guevara Noubir2,*
  • 1: Network Security Lab (NSL), Department of Electrical Engineering University of Washington, Seattle, WA, USA.
  • 2: College of Computer and Information Science Northeastern University, Boston, MA, USA.
*Contact email: tague@u.washington.edu, dmslater@u.washington.edu, rp3@u.washington.edu, noubir@ccs.neu.edu

Abstract

—We present a new class of network attacks, referred to as flow-jamming attacks, in which an adversary with multiple jammers throughout the network jams packets to reduce traffic flow. We propose a linear programming framework for flowjamming attacks, providing a foundation for the design of future protocols to mitigate flow-jamming. We propose metrics to evaluate the effect of a flow-jamming attack on network flow and the resource expenditure of the jamming adversary. We develop, evaluate, and compare a variety of flow-jamming attacks using the proposed metrics and the linear programming formulation. In addition, we formulate two approaches for distributed flow-jamming attacks for a set of jammers operating without centralized control and compare the performance to the centralized attacks using the linear programming formulation