Skip to main content
Top

2013 | OriginalPaper | Chapter

An Epidemic-Dynamics-Based Model for CXPST Spreading in Inter-Domain Routing System

Authors : Yu Wang, Zhenxing Wang, Liancheng Zhang

Published in: Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA), 2013

Publisher: Springer Berlin Heidelberg

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

We study the CXPST attack which aims at the destruction of inter-domain routing system and propose a spreading model to represent the threatening scale. By analyzing the process we illuminate the mechanism of how CXPST seizes the BGP deficiencies to paralyze the Internet control plane from the traffic attack of data plane, and then the spreading model named as EDM-CS is presented based by the epidemic dynamics theory. Parameters of the model are closely associated with the real network topology and BGP router overloading condition which reflect the features of the CXPST spreading. In virtue of the classical BA scale-free network, spreading density that derives from EDM-CS behaves great consistency with the simulation results based on the collected data from CAIDA. This model can help understanding CXPST attack and providing a basis for predicting the spreading trend, as well as investigating effective defense strategy.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Wan T, Van Oorschot P C (2006) Analysis of BGP prefix origins during Google’s May 2005 outage. Proceedings of the 20th international parallel and distributed processing symposium. 135–142 Wan T, Van Oorschot P C (2006) Analysis of BGP prefix origins during Google’s May 2005 outage. Proceedings of the 20th international parallel and distributed processing symposium. 135–142
3.
go back to reference Schuchard M, Vasserman E Y, Mohaisen A, Kune D F, Hopper N, Kim Y (2010) Losing control of the internet: Using the data plane to attack the control plane. Proceedings of the 17th ACM conference on computer and communication security. 726–728 Schuchard M, Vasserman E Y, Mohaisen A, Kune D F, Hopper N, Kim Y (2010) Losing control of the internet: Using the data plane to attack the control plane. Proceedings of the 17th ACM conference on computer and communication security. 726–728
4.
go back to reference Li X, Wang X (2006) Controlling the spreading in small-world evolving networks stability, oscillation, and topology. IEEE Trans Autom Control 3(51):534–540MathSciNetCrossRef Li X, Wang X (2006) Controlling the spreading in small-world evolving networks stability, oscillation, and topology. IEEE Trans Autom Control 3(51):534–540MathSciNetCrossRef
5.
go back to reference Zou CC, Towsley D, Gong W (2006) On the performance of Internet worm scanning strategies. Perform Eval 63:700–723CrossRef Zou CC, Towsley D, Gong W (2006) On the performance of Internet worm scanning strategies. Perform Eval 63:700–723CrossRef
6.
go back to reference Chung-Yuan H, Yu-Shiuan T, Tzai-Hung W (2010) A Network-based simulation architecture for studying epidemic dynamics. Simulation 86(5–6):351–368 Chung-Yuan H, Yu-Shiuan T, Tzai-Hung W (2010) A Network-based simulation architecture for studying epidemic dynamics. Simulation 86(5–6):351–368
7.
go back to reference Ogierman A, Elsasser R (2012) The impact of the power law exponent on the behaviour of a dynamic epidemic type process. Proceedings of 24th ACM symposium on parallelism in algorithm and architectures, 131–139 Ogierman A, Elsasser R (2012) The impact of the power law exponent on the behaviour of a dynamic epidemic type process. Proceedings of 24th ACM symposium on parallelism in algorithm and architectures, 131–139
8.
go back to reference Faloutsos M, Faloutsos P, Faloutsos C (1999) On power-law relationships of the Internet topology. ACM SIGCOMM Comput Commun Rev 4(29):251–262CrossRefMATH Faloutsos M, Faloutsos P, Faloutsos C (1999) On power-law relationships of the Internet topology. ACM SIGCOMM Comput Commun Rev 4(29):251–262CrossRefMATH
9.
go back to reference Siganos G, Faloutsos M, Faloutsos P, Faloutsos C (2003) Power laws and the AS-level internet topology. IEEE/ACM Trans Networking 4(11):514–524CrossRefMATH Siganos G, Faloutsos M, Faloutsos P, Faloutsos C (2003) Power laws and the AS-level internet topology. IEEE/ACM Trans Networking 4(11):514–524CrossRefMATH
10.
12.
go back to reference Guo Y, Wang Z, Luo S, Wang Y (2011) A cascading failure model for inter domain routing system. Int J Commun Syst 25:1068–1076CrossRef Guo Y, Wang Z, Luo S, Wang Y (2011) A cascading failure model for inter domain routing system. Int J Commun Syst 25:1068–1076CrossRef
13.
go back to reference Sinclair G, Nunnery C, Kang B B (2009) The waledac protocol: The how and why. Proceedings of the 4th IEEE international conference on malicious and unwanted software, 69–77 Sinclair G, Nunnery C, Kang B B (2009) The waledac protocol: The how and why. Proceedings of the 4th IEEE international conference on malicious and unwanted software, 69–77
Metadata
Title
An Epidemic-Dynamics-Based Model for CXPST Spreading in Inter-Domain Routing System
Authors
Yu Wang
Zhenxing Wang
Liancheng Zhang
Copyright Year
2013
Publisher
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-642-37502-6_58

Premium Partner