Bounds on service quality for networks subject to augmentation and attack

Assessing a network's vulnerability to attack and random failure is a difficult and important problem that changes with network application and representation. We furnish algorithms that bound the robustness of a network under attack. We utilize both static graph-based and dynamic trace-driven representations to construct solutions appropriate for different scenarios. For static graphs we first introduce a spectral technique for developing a lower bound on the number of connected pairs of vertices in a graph after edge removal, which we apply to random graphs and the power grid of the Philippines. To address the problem of resource availability in networks we develop a second technique for bounding the number of nominally designated client vertices that can be disconnected from all server vertices after either edge or vertex removal (or both). This algorithm is also tested on the power grid and a wireless mesh network, the Internet AS level graph, and the highway systems of Iowa and Michigan. Dynamic networks are modeled as disruption tolerant networks (DTNs). DTNs are composed of mobile nodes that are intermittently connected via short-range wireless radios. In the context of both human and vehicular mobility networks we study both the effect of targeted node removal and the effect of augmentation with stationary relays.

[1]  Walter Willinger,et al.  Towards a Theory of Scale-Free Graphs: Definition, Properties, and Implications , 2005, Internet Math..

[2]  Ellen W. Zegura,et al.  Trading latency for energy in densely deployed wireless ad hoc networks using message ferrying , 2007, Ad Hoc Networks.

[3]  Ellen W. Zegura,et al.  Capacity Enhancement using Throwboxes in DTNs , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[4]  Jean-Loup Guillaume,et al.  Comparison of Failures and Attacks on Random and Scale-Free Networks , 2004, OPODIS.

[5]  S. Havlin,et al.  Breakdown of the internet under intentional attack. , 2000, Physical review letters.

[6]  Nick Feamster,et al.  Understanding the network-level behavior of spammers , 2006, SIGCOMM 2006.

[7]  Christos H. Papadimitriou,et al.  Heuristically Optimized Trade-Offs: A New Paradigm for Power Laws in the Internet , 2002, ICALP.

[8]  Alan T. Murray,et al.  Comparative Approaches for Assessing Network Vulnerability , 2008 .

[9]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[10]  Xiaodong Lin,et al.  SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks , 2009, IEEE Transactions on Vehicular Technology.

[11]  G. B. A. Barab'asi Competition and multiscaling in evolving networks , 2000, cond-mat/0011029.

[12]  Dave Katz,et al.  Application of the Border Gateway Protocol in the Internet , 1990, RFC.

[13]  Bruce Hendrickson,et al.  The Chaco user`s guide. Version 1.0 , 1993 .

[14]  Pan Hui,et al.  Pocket switched networks and human mobility in conference environments , 2005, WDTN '05.

[15]  Andrew B. Kahng,et al.  New spectral methods for ratio cut partitioning and clustering , 1991, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..

[16]  Yih-Chun Hu,et al.  SPV: secure path vector routing for securing BGP , 2004, SIGCOMM.

[17]  Panos M. Pardalos,et al.  Detecting critical nodes in sparse graphs , 2009, Comput. Oper. Res..

[18]  Arun Venkataramani,et al.  Interactive wifi connectivity for moving vehicles , 2008, SIGCOMM '08.

[19]  Walter Willinger,et al.  A first-principles approach to understanding the internet's router-level topology , 2004, SIGCOMM '04.

[20]  A. Barabasi,et al.  Scale-free characteristics of random networks: the topology of the world-wide web , 2000 .

[21]  Ralf Diekmann,et al.  The PARTY Partitioning Library User Guide - Version 1.1 , 1996 .

[22]  Thomas Erlebach,et al.  On the Spectrum and Structure of Internet Topology Graphs , 2002, IICS.

[23]  Martine D. F. Schlag,et al.  Spectral K-Way Ratio-Cut Partitioning and Clustering , 1993, 30th ACM/IEEE Design Automation Conference.

[24]  F. Chung,et al.  Eigenvalues of Random Power law Graphs , 2003 .

[25]  Curt Jones,et al.  Finding Good Approximate Vertex and Edge Partitions is NP-Hard , 1992, Inf. Process. Lett..

[26]  Hari Balakrishnan,et al.  Cabernet: vehicular content delivery using WiFi , 2008, MobiCom '08.

[27]  Carl A. Gunter,et al.  Denial in DTNs , 2010 .

[28]  David M. Pennock,et al.  Static and dynamic analysis of the Internet's susceptibility to faults and attacks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[29]  J.J. Garcia-Luna-Aceves,et al.  Securing the border gateway routing protocol , 1996, Proceedings of GLOBECOM'96. 1996 IEEE Global Telecommunications Conference.

[30]  Béla Bollobás,et al.  Mathematical results on scale‐free random graphs , 2005 .

[31]  A. Hoffman,et al.  Lower bounds for the partitioning of graphs , 1973 .

[32]  Damien Magoni,et al.  Tearing down the Internet , 2003, IEEE J. Sel. Areas Commun..

[33]  Dmitri V. Krioukov,et al.  Revealing the Autonomous System Taxonomy: The Machine Learning Approach , 2006, ArXiv.

[34]  Anthony Bonato,et al.  A Survey of Models of the Web Graph , 2004, CAAN.

[35]  Donald F. Towsley,et al.  Relays, base stations, and meshes: enhancing mobile networks with infrastructure , 2008, MobiCom '08.

[36]  Shi Zhou,et al.  The missing links in the BGP-based AS connectivity maps , 2003, ArXiv.

[37]  F. Chung,et al.  Weighted graph Laplacians and isoperimetric inequalities , 2000 .

[38]  Patrick D. McDaniel,et al.  Optimizing BGP security by exploiting path stability , 2006, CCS '06.

[39]  Norbert Sensen,et al.  Lower Bounds and Exact Algorithms for the Graph Partitioning Problem Using Multicommodity Flows , 2001, ESA.

[40]  Stephen P. Boyd,et al.  Semidefinite Programming , 1996, SIAM Rev..

[41]  Brian Neil Levine,et al.  An Energy-Efficient Architecture for DTN Throwboxes , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[42]  Evangelos Kranakis,et al.  Pretty Secure BGP, psBGP , 2005, NDSS.

[43]  Satish Rao,et al.  Graph partitioning using single commodity flows , 2006, STOC '06.

[44]  Jie Wu,et al.  Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets , 2009, IEEE INFOCOM 2009.

[45]  M. Amin,et al.  Security challenges for the electricity infrastructure , 2002 .

[46]  Ling-Jyh Chen,et al.  A hybrid routing approach for opportunistic networks , 2006, CHANTS '06.

[47]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[48]  Jörg Widmer,et al.  Network coding for efficient communication in extreme networks , 2005, WDTN '05.

[49]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[50]  Gary L. Miller,et al.  On the performance of spectral graph partitioning methods , 1995, SODA '95.

[51]  Albert-László Barabási,et al.  Error and attack tolerance of complex networks , 2000, Nature.

[52]  Satish Rao,et al.  Expander flows, geometric embeddings and graph partitioning , 2004, STOC '04.

[53]  S. Bezrukov Edge Isoperimetric Problems on Graphs , 2007 .

[54]  Béla Bollobás,et al.  Robustness and Vulnerability of Scale-Free Random Graphs , 2004, Internet Math..

[55]  Taieb Znati,et al.  On Approximation of New Optimization Methods for Assessing Network Vulnerability , 2010, 2010 Proceedings IEEE INFOCOM.

[56]  Christos Gkantsidis,et al.  Spectral analysis of Internet topologies , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[57]  Adrian Perrig,et al.  Modeling adoptability of secure BGP protocol , 2006, SIGCOMM 2006.

[58]  Arun Venkataramani,et al.  Enhancing interactive web applications in hybrid networks , 2008, MobiCom '08.

[59]  Lixin Gao,et al.  Estimation based erasure-coding routing in delay tolerant networks , 2006, IWCMC '06.

[60]  D S Callaway,et al.  Network robustness and fragility: percolation on random graphs. , 2000, Physical review letters.

[61]  Steven M. Bellovin,et al.  Using Link Cuts to Attack Internet Routing , 2003 .

[62]  GAO-09-57 Highway Infrastructure: Federal Efforts to Strengthen Security Should Be Better Coordinated and Targeted on the Nation's Most Critical Highway Infrastructure , 2009 .

[63]  A. Barabasi,et al.  Hierarchical Organization of Modularity in Metabolic Networks , 2002, Science.

[64]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[65]  Massoud Amin North America's Electricity Infrastructure: Are We Ready for More Perfect Storms? , 2003, IEEE Secur. Priv..

[66]  Adrian Perrig,et al.  Modeling adoptability of secure BGP protocols , 2006, SIGMETRICS '06/Performance '06.

[67]  Noga Alon,et al.  Spectral Techniques in Graph Algorithms , 1998, LATIN.

[68]  A. Seary,et al.  Partitioning Networks by Eigenvectors , 2004 .

[69]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[70]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[71]  M. Fiedler Algebraic connectivity of graphs , 1973 .

[72]  Alex Pothen,et al.  PARTITIONING SPARSE MATRICES WITH EIGENVECTORS OF GRAPHS* , 1990 .

[73]  Walter Willinger,et al.  What Causal Forces Shape Internet Connectivity at the AS-level? , 2003 .

[74]  Brian Gallagher,et al.  MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[75]  Ellen W. Zegura,et al.  Hierarchical power management in disruption tolerant networks with traffic-aware optimization , 2006, CHANTS '06.

[76]  Christian Wewetzer,et al.  Data aggregation and roadside unit placement for a vanet traffic information system , 2008, VANET '08.

[77]  Vinny Cahill,et al.  When TCP Breaks: Delay- and Disruption- Tolerant Networking , 2006, IEEE Internet Computing.

[78]  Cauligi S. Raghavendra,et al.  Spray and wait: an efficient routing scheme for intermittently connected mobile networks , 2005, WDTN '05.

[79]  Adrian Perrig,et al.  Security in wireless sensor networks - eScholarship , 2004 .

[80]  Ahmad Al Hanbali,et al.  Delay and resource analysis in MANETs in presence of throwboxes , 2007, Perform. Evaluation.

[81]  Albert-László Barabási,et al.  Scale‐Free and Hierarchical Structures in Complex Networks , 2003 .

[82]  Walter Willinger,et al.  Internet connectivity at the AS-level: an optimization-driven modeling approach , 2003, MoMeTools '03.

[83]  Arnold L. Rosenberg,et al.  Graph Separators, with Applications , 2001, Frontiers of Computer Science.

[84]  Stephen T. Kent,et al.  Secure Border Gateway Protocol (S-BGP) - Real World Performance and Deployment Issues , 2000, NDSS.

[85]  Jörg Ott,et al.  Controlling resource hogs in mobile delay-tolerant networks , 2010, Comput. Commun..

[86]  Yee Wei Law,et al.  Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2005, TOSN.

[87]  Lixin Gao On inferring autonomous system relationships in the internet , 2001, TNET.

[88]  E. Schwartz,et al.  Isoperimetric Graph Partitioning for Data Clustering and Image Segmentation , 2003 .

[89]  William A. Arbaugh,et al.  Your 80211 wireless network has no clothes , 2002, IEEE Wirel. Commun..

[90]  Fan Chung Graham,et al.  Diameter bounds for altered graphs , 1984, J. Graph Theory.

[91]  A. Hoffman,et al.  Partitioning, Spectra and Linear Programming , 1984 .

[92]  Walter Willinger,et al.  Understanding Internet topology: principles, models, and validation , 2005, IEEE/ACM Transactions on Networking.

[93]  Alan M. Frieze,et al.  Adversarial deletion in a scale free random graph process , 2005, SODA '05.

[94]  M. Fiedler A property of eigenvectors of nonnegative symmetric matrices and its application to graph theory , 1975 .

[95]  Yong Wang,et al.  Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with ZebraNet , 2002, ASPLOS X.

[96]  Michalis Faloutsos,et al.  On power-law relationships of the Internet topology , 1999, SIGCOMM '99.

[97]  Margaret Martonosi,et al.  Erasure-coding based routing for opportunistic networks , 2005, WDTN '05.

[98]  Arun Venkataramani,et al.  DTN routing as a resource allocation problem , 2007, SIGCOMM '07.

[99]  Michael William Newman,et al.  The Laplacian spectrum of graphs , 2001 .

[100]  Timur Friedman,et al.  DTN routing in a mobility pattern space , 2005, WDTN '05.

[101]  Roger Stough,et al.  The Revenge of Distance: Vulnerability Analysis of Critical Information Infrastructure , 2003, cond-mat/0310427.

[102]  Robert Elsässer,et al.  New spectral bounds on k-partitioning of graphs , 2001, SPAA '01.

[103]  Ying-Cheng Lai,et al.  Complex networks: Dynamics and security , 2005 .

[104]  Shi Zhou,et al.  Redundancy and Robustness of the AS-level Internet topology and its models , 2004, ArXiv.

[105]  Chris H. Q. Ding,et al.  A spectral method to separate disconnected and nearly-disconnected web graph components , 2001, KDD '01.

[106]  Qing Zhao,et al.  Semidefinite Programming Relaxations for the Graph Partitioning Problem , 1999, Discret. Appl. Math..

[107]  A. L. O N On the edge-expansion of graphs , 2002 .

[108]  FaloutsosMichalis,et al.  On power-law relationships of the Internet topology , 1999 .

[109]  David A. Wagner,et al.  Security in wireless sensor networks , 2004, SASN '04.

[110]  Frank Thomson Leighton,et al.  Multicommodity max-flow min-cut theorems and their use in designing approximation algorithms , 1999, JACM.

[111]  Jon M. Kleinberg,et al.  Detecting a Network Failure , 2004, Internet Math..

[112]  Rabin K. Patra,et al.  Using redundancy to cope with failures in a delay tolerant network , 2005, SIGCOMM '05.

[113]  B. Mohar THE LAPLACIAN SPECTRUM OF GRAPHS y , 1991 .

[114]  Aleksandrs Slivkins,et al.  Network failure detection and graph connectivity , 2004, SODA '04.

[115]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[116]  William A. Arbaugh,et al.  YOUR 802.11 WIRELESS NETWORK HAS NO CLOTHES , 2001 .

[117]  kc claffy,et al.  Internet topology: connectivity of IP graphs , 2001, SPIE ITCom.

[118]  S. Low,et al.  The "robust yet fragile" nature of the Internet. , 2005, Proceedings of the National Academy of Sciences of the United States of America.

[119]  S. Chakrabarti,et al.  QoS issues in ad hoc wireless networks , 2001, IEEE Commun. Mag..

[120]  Fan Chung,et al.  Graphs with small diameter after edge deletion , 1992 .

[121]  Sandra L. Murphy,et al.  BGP Security Vulnerabilities Analysis , 2006, RFC.

[122]  Oliver Brock,et al.  MV routing and capacity building in disruption tolerant networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[123]  J M Carlson,et al.  Highly optimized tolerance: a mechanism for power laws in designed systems. , 1999, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.

[124]  Beom Jun Kim,et al.  Attack vulnerability of complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[125]  J. J. Garcia-Luna-Aceves,et al.  Securing distance-vector routing protocols , 1997, Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security.

[126]  Alex Pentland,et al.  DakNet: rethinking connectivity in developing nations , 2004, Computer.

[127]  B. Mohar,et al.  Eigenvalues in Combinatorial Optimization , 1993 .

[128]  Heejo Lee,et al.  Attack Resiliency of Network Topologies , 2004, PDCAT.

[129]  Danny Dolev,et al.  Internet resiliency to attacks and failures under BGP policy routing , 2006, Comput. Networks.

[130]  Elizabeth M. Belding-Royer,et al.  Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.

[131]  Anthony H. Dekker,et al.  Network Robustness and Graph Topology , 2004, ACSC.

[132]  Albert-Laszlo Barabasi,et al.  Deterministic scale-free networks , 2001 .