Skip to main content

2012 | Buch

Group Testing Theory in Network Security

An Advanced Solution

insite
SUCHEN

Über dieses Buch

Group Testing Theory in Network Security explores a new branch of group testing theory with an application which enhances research results in network security. This brief presents new solutions on several advanced network security problems and mathematical frameworks based on the group testing theory, specifically denial-of-service and jamming attacks. A new application of group testing, illustrated in this text, requires additional theories, such as size constraint group testing and connected group testing. Included in this text is a chapter devoted to discussing open problems and suggesting new solutions for various network security problems. This text also exemplifies the connection between mathematical approaches and practical applications to group testing theory in network security. This work will appeal to a multidisciplinary audience with interests in computer communication networks, optimization, and engineering.

Inhaltsverzeichnis

Frontmatter
Chapter 1. Group Testing Theory
Abstract
In this chapter, we briefly present an overview of group testing, its basic theory, and construction. We also present a general framework on using group testing for several network security defense schemes as well as discuss new challenges.
My T. Thai
Chapter 2. Size Constraint Group Testing and DoS Attacks
Abstract
In this chapter, we introduce the first application of group testing in detecting application Denial-of-Service (DoS) attack , which aims at disrupting application service rather than depleting the network resource. This attack has emerged as one of the greatest threat to network services. Owing to its high similarity to legitimate traffic and much lower launching overhead than classic DoS attack, this new assault type cannot be efficiently detected or prevented by existing detection solutions. To identify application DoS attack, we present a novel group testing (GT)-based approach deployed on back-end servers, which not only offers a theoretical method to obtain short detection delay and low false positive/negative rate, but also provides an underlying framework against general network attacks. This new application requires a new class of group testing, called size constraint group testing.
My T. Thai
Chapter 3. Interference Free Group Testing and Reactive Jamming Attacks
Abstract
Another application of group testing that we would like to introduce is to against reactive jamming attacks , which has emerged as a great security threat to wireless sensor networks, due to its mass destruction to legitimate sensor communications and difficulty to be disclosed and defended. There exist many studies against these attacks, however, these methods, i.e., frequency hopping or channel surfing, require excessive computational capabilities on wireless devices. To overcome the shortcomings, we present here an interference free group-testing based solution by identifying the trigger nodes, whose transmissions activate any reactive jammers. The identification of these trigger nodes can help us to (1) carefully design a better routing protocol by switching these nodes into only receivers to avoid activating jammers and (2) locate the jammers based on the trigger nodes, thus providing an alternative mechanism against reactive jamming attacks. The theoretical analysis and experimental results show that this advanced scheme performs well in terms of time and message complexities.
My T. Thai
Chapter 4. Randomized Fault Tolerant Group Testing and Advanced Security
Abstract
In this chapter, we further optimize the time complexity of the scheme discussed in Chap.​ 3 and provide more advanced solutions. In detail, a randomized fault-tolerant group testing construction to reduce the computational cost, compared to the one using irreducible polynomials on Galois Field is introduced. Based on such a new GT construction, a more robust defense solution to an advanced jamming attack is presented for various network scenarios. Theoretical analysis and simulation results are included to validate the performance of this framework.
My T. Thai
Chapter 5. Outlooks
Abstract
In this concluding chapter, the outlook and open group testing-related problems in network security are presented. In particular, we discuss about a low time complexity for matrix construction, fault-tolerant group testing construction, and the theory aspect of size constraint group testing as well as applications of the trigger nodes detection approach.
My T. Thai
Backmatter
Metadaten
Titel
Group Testing Theory in Network Security
verfasst von
My T. Thai
Copyright-Jahr
2012
Verlag
Springer New York
Electronic ISBN
978-1-4614-0128-5
Print ISBN
978-1-4614-0127-8
DOI
https://doi.org/10.1007/978-1-4614-0128-5

Premium Partner