About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
6th International ICST Symposium on Modeling and Optimization

Research Article

Linear Programming Models for Jamming Attacks on Network Traffic Flows

Download848 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.4108/ICST.WIOPT2008.3170,
        author={Patrick Tague and David Slater and Radha Poovendran and Guevara Noubir},
        title={Linear Programming Models for Jamming Attacks on Network Traffic Flows},
        proceedings={6th International ICST Symposium on Modeling and Optimization},
        publisher={IEEE},
        proceedings_a={WIOPT},
        year={2008},
        month={8},
        keywords={Centralized control  Computer crime  Information security  Jamming  Linear programming  Protocols  Spread spectrum communication  Telecommunication traffic Traffic control US Government},
        doi={10.4108/ICST.WIOPT2008.3170}
    }
    
  • Patrick Tague
    David Slater
    Radha Poovendran
    Guevara Noubir
    Year: 2008
    Linear Programming Models for Jamming Attacks on Network Traffic Flows
    WIOPT
    IEEE
    DOI: 10.4108/ICST.WIOPT2008.3170
Patrick Tague1,*, David Slater1,*, Radha Poovendran1,*, Guevara Noubir2,*
  • 1: Network Security Lab (NSL), Department of Electrical Engineering University of Washington, Seattle, WA, USA.
  • 2: College of Computer and Information Science Northeastern University, Boston, MA, USA.
*Contact email: tague@u.washington.edu, dmslater@u.washington.edu, rp3@u.washington.edu, noubir@ccs.neu.edu

Abstract

—We present a new class of network attacks, referred to as flow-jamming attacks, in which an adversary with multiple jammers throughout the network jams packets to reduce traffic flow. We propose a linear programming framework for flowjamming attacks, providing a foundation for the design of future protocols to mitigate flow-jamming. We propose metrics to evaluate the effect of a flow-jamming attack on network flow and the resource expenditure of the jamming adversary. We develop, evaluate, and compare a variety of flow-jamming attacks using the proposed metrics and the linear programming formulation. In addition, we formulate two approaches for distributed flow-jamming attacks for a set of jammers operating without centralized control and compare the performance to the centralized attacks using the linear programming formulation

Keywords
Centralized control Computer crime Information security Jamming Linear programming Protocols Spread spectrum communication Telecommunication traffic Traffic control US Government
Published
2008-08-01
Publisher
IEEE
Modified
2010-05-16
http://dx.doi.org/10.4108/ICST.WIOPT2008.3170
Copyright © 2008–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL