An attacker-defender model for IP-based networks
Barkley, Timothy R.
Alderson, David L.
Carlyle, W. Matthew
MetadataShow full item record
The Internet Protocol (IP) has emerged as the dominant technology for determining how data is routed across the Internet. Because IP flows are defined essentially in terms of origin-destination (O-D) pairs, we represent IP traffic engineering as a multi-commodity flow problem in which each O-D pair is treated as a separate commodity. We account for the diversity in IP routing by modeling opposite extremes of traffic engineering: "naive" traffic engineering where the IP routes data between any two users using only the shortest path between them, and "best case" traffic engineering where IP has the flexibility to route data using multiple paths in the network regardless of their length. We develop linear programming formulations that identify the maximum data flow for an IP network that satisfies proportionality constraints for traffic demand for each case of traffic engineering, and we also determine the optimal interdiction of those flows that reduces that maximum flow in the worst possible way.
Showing items related by title, author, creator and subject.
An evaluation of best effort traffic management of server and agent based active network management (SAAM) architecture Ayvat, Birol (Monterey, California. Naval Postgraduate School, 2003-03);The Server and Agent-based Active Network Management (SAAM) architecture was initially designed to work with the next generation Internet where increasingly sophisticated applications will require QoS guarantees. Although ...
Sanchez, Aaron (Monterey, California. Naval Postgraduate School, 2010-03);Internet Service Providers (ISPs) offer access to the Internet and other network resources to their customers. The ISP marketplace is extremely competitive, requiring ISPs to provide their services with limited resources. ...
Mitigating distributed denial of service attacks with Multiprotocol Label Switching--Traffic Engineering (MPLS-TE) Vordos, Ioannis (Monterey, California. Naval Postgraduate School, 2009-03);A Denial of Service (DoS) occurs when legitimate users are prevented from using a service over a computer network. A Distributed Denial of Service (DDoS) attack is a more serious form of DoS in which an attacker uses the ...