首页> 外文期刊>IEEE Transactions on Cognitive Communications and Networking >Blind Network Interdiction Strategies—A Learning Approach
【24h】

Blind Network Interdiction Strategies—A Learning Approach

机译:盲网拦截策略-一种学习方法

获取原文
获取原文并翻译 | 示例
       

摘要

Network interdiction refers to disrupting a network in an attempt to either analyze the network’s vulnerabilities or to undermine a network’s communication capabilities. A vast majority of the works that have studied network interdiction assume a priori knowledge of the network topology. However, such knowledge may not be available in real-time settings. For instance, in practical electronic warfare-type settings, an attacker that intends to disrupt communication in the network may not know the topology a priori. Hence, it is necessary to develop online learning strategies that enable the attacker to interdict communication in the underlying network in real-time. In this paper, we develop several learning techniques that enable the attacker to learn the best network interdiction strategies (in terms of the best nodes to attack to maximally disrupt communication in the network) and also discuss the potential limitations that the attacker faces in such blind scenarios. We consider settings where 1) only one node can be attacked and 2) where multiple nodes can be attacked in the network. In addition to the single-attacker setting, we also discuss learning strategies when multiple attackers attack the network and discuss the limitations they face in real-time settings. Several different network topologies are considered in this study using which we show that under the blind settings considered in this paper, except for some simple network topologies, the attacker cannot optimally (measured in terms of the number of flows stopped) attack the network.
机译:网络封锁是指破坏网络以试图分析网络的漏洞或破坏网络的通信能力。研究网络遮断的绝大多数工作都假定具有网络拓扑的先验知识。但是,此类知识可能无法在实时设置中获得。例如,在实际的电子战类型设置中,打算破坏网络中的通信的攻击者可能不会事先知道拓扑。因此,有必要开发一种在线学习策略,使攻击者能够实时阻止底层网络中的通信。在本文中,我们开发了几种学习技术,使攻击者能够学习最佳的网络拦截策略(就攻击的最佳节点而言,可以最大程度地破坏网络中的通信),还讨论了攻击者在这种盲目环境中面临的潜在限制场景。我们考虑以下设置:1)网络中只能攻击一个节点,2)网络中可以攻击多个节点。除了单一攻击者设置之外,我们还讨论了多个攻击者攻击网络时的学习策略,并讨论了他们在实时设置中面临的局限性。在这项研究中考虑了几种不同的网络拓扑,通过这些拓扑我们表明,在本文所考虑的盲目设置下,除了一些简单的网络拓扑之外,攻击者无法最佳地(以停止的流量数量衡量)攻击网络。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号