Research Article
Linear Programming Models for Jamming Attacks on Network Traffic Flows
@INPROCEEDINGS{10.4108/ICST.WIOPT2008.3170, author={Patrick Tague and David Slater and Radha Poovendran and Guevara Noubir}, title={Linear Programming Models for Jamming Attacks on Network Traffic Flows}, proceedings={6th International ICST Symposium on Modeling and Optimization}, publisher={IEEE}, proceedings_a={WIOPT}, year={2008}, month={8}, keywords={Centralized control Computer crime Information security Jamming Linear programming Protocols Spread spectrum communication Telecommunication traffic Traffic control US Government}, doi={10.4108/ICST.WIOPT2008.3170} }
- Patrick Tague
David Slater
Radha Poovendran
Guevara Noubir
Year: 2008
Linear Programming Models for Jamming Attacks on Network Traffic Flows
WIOPT
IEEE
DOI: 10.4108/ICST.WIOPT2008.3170
Abstract
We present a new class of network attacks, referred to as flow-jamming attacks, in which an adversary with multiple jammers throughout the network jams packets to reduce traffic flow. We propose a linear programming framework for flowjamming attacks, providing a foundation for the design of future protocols to mitigate flow-jamming. We propose metrics to evaluate the effect of a flow-jamming attack on network flow and the resource expenditure of the jamming adversary. We develop, evaluate, and compare a variety of flow-jamming attacks using the proposed metrics and the linear programming formulation. In addition, we formulate two approaches for distributed flow-jamming attacks for a set of jammers operating without centralized control and compare the performance to the centralized attacks using the linear programming formulation