Optimal resource allocation to defend against deliberate attacks in networking infrastructures

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

7 Scopus Citations
View graph of relations

Author(s)

Related Research Unit(s)

Detail(s)

Original languageEnglish
Title of host publication2012 Proceedings IEEE INFOCOM
PublisherInstitute of Electrical and Electronics Engineers, Inc.
Pages639-647
ISBN (electronic)978-1-4673-0775-8, 978-1-4673-0774-1
ISBN (print)978-1-4673-0773-4
Publication statusPublished - 2012

Publication series

NameProceedings - IEEE INFOCOM
ISSN (Print)0743-166X
ISSN (electronic)0743-166X

Conference

TitleIEEE Conference on Computer Communications, INFOCOM 2012
PlaceUnited States
CityOrlando
Period25 - 30 March 2012

Abstract

Protecting networking infrastructures from malicious attacks is important as a successful attack on a high data rate link can cause the loss or delay of large amounts of data. In this paper, we consider a proactive approach where the ISPs are willing to allocate some (limited) resources to defend the networking infrastructures against the attacks. We aim to answer where and how much the defending resource should be placed so that the expected data loss can be minimized no matter where the attacker may launch the attack. We model the problem as a 2-player zero-sum game where the payoffs are measured by the maximum network flow. In order to overcome the unique challenges of such payoffs, we transform the payoffs into explicit piece-wise functions through multi-parametric linear programming (MP-LP) and divide the entire strategy space into a set of critical regions. We prove that a global Nash Equilibrium (NE) exists when there is only one critical region. However, when the number of critical regions is greater than 1, there is no global NE. We also prove that there exists one and only one local NE in each critical region. We then design a mixed-strategy solution. Our results have shown that to dedicate all defending resources to one min-cut set when there are multiple min-cut sets will not be an optimal solution, however, min-cut strategies will have higher probabilities to be selected in the mixed-strategy solution when the defending resource is limited. © 2012 IEEE.

Citation Format(s)

Optimal resource allocation to defend against deliberate attacks in networking infrastructures. / Xiao, Xun; Li, Minming; Wang, Jianping et al.
2012 Proceedings IEEE INFOCOM. Institute of Electrical and Electronics Engineers, Inc., 2012. p. 639-647 (Proceedings - IEEE INFOCOM).

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review