Cluster Computing

, Volume 19, Issue 3, pp 1183–1200 | Cite as

Security of grid structures under disguised traffic attacks

  • D. A. Zaitsev
  • T. R. Shmeleva
  • W. Retschitzegger
  • B. Pröll
Article

Abstract

Models of rectangular grid structures were constructed in the form of a colored Petri net. The basic model consists of a matrix of switching nodes that deliver packets to computing nodes which are attached to the matrix borders and produce and consume packets. Since grid structures are often employed to solve boundary value problems, square and torus surfaces were studied and generalized to hypercube and hypertorus in multidimensional space using a grid node that aggregates switching and computing nodes. Traffic guns were added to the models to represent traffic attacks. Simulation in CPN Tools revealed simple and dangerous traffic gun configurations, such as a traffic duel, focus, crossfire, and side shot, which bring the grid to complete deadlock at less than 5 % of the grid peak load. Comparably low gun intensity targeted to induce deadlock areas within a grid (network) is a key characteristic of disguised traffic attacks. The aim of future work will be to develop counter-measures for these attacks.

Keywords

Computing grid Security Traffic attack Performance evaluation Colored Petri net Deadlock 

References

  1. 1.
    Grid and Cloud Computing: Concepts, Methodologies, Tools and Applications, vol. 4. Information Resources Management Association (USA), IGI-Global (2012). http://www.igi-global.com/book/grid-cloud-computing/60756
  2. 2.
    Preve, N.P. (ed.): Grid Computing: Towards a Global Interconnected Infrastructure. Springer, London (2011)Google Scholar
  3. 3.
    Roosta, S.H.: Parallel Processing and Parallel Algorithms. Springer, New York (2006)MATHGoogle Scholar
  4. 4.
    Ranka, S., Sahni, S.: Hypercube Algorithms: with Application to Image Processing and Pattern Recognition. Springer, New York (2011)MATHGoogle Scholar
  5. 5.
    Borzi, A., Schulz, V.: Computational Optimization of Systems Governed by Partial Differential Equations. SIAM, Philadelphia (2012)MATHGoogle Scholar
  6. 6.
    Dennis Jr., J.R., Schnabel, R.B.: Numerical Methods for Unconstrained Optimization and Nonlinear Equations. SIAM, Philadelphia (1996)CrossRefMATHGoogle Scholar
  7. 7.
    Jovanovic, B.S., Suli, E.: Analysis of Finite Difference Schemes. Springer, London (2014)CrossRefMATHGoogle Scholar
  8. 8.
    Garland, W.J.: Reactor Physics: Numerical Methods. Ontario University, Ontario (2004)Google Scholar
  9. 9.
    Miyamoto, K.: Plasma Physics and Controlled Nuclear Fusion. Springer, Berlin (2005)MATHGoogle Scholar
  10. 10.
    Shooman, M.L.: Reliability of Computer Systems and Networks: Fault Tolerance, Analysis, and Design. Wiley, New York (2002)CrossRefGoogle Scholar
  11. 11.
    Dai, Yuan-Shun, Levitin, G.: Optimal resource allocation for maximizing performance and reliability in tree-structured grid services. IEEE Trans. Reliab. 3(56), 444–453 (2007)CrossRefGoogle Scholar
  12. 12.
    Levitin, G., Dai, Y.S., Ben-Haim, H.: Reliability and performance of star topology grid service with precedence constraints on subtask execution. IEEE Trans. Reliab. 3(55), 507–515 (2006)CrossRefGoogle Scholar
  13. 13.
    Lai, Pao-Lien: A systematic algorithm for identifying faults on hypercube-like networks under the comparison model. IEEE Trans. Reliab. 2(61), 452–459 (2012)CrossRefGoogle Scholar
  14. 14.
    Jie, Wu, Gao, Feng, Li, Zhongcheng, Min, Yinghua: Optimal, and reliable communication in hypercubes using extended safety vectors. IEEE Trans. Reliab. 3(54), 402–411 (2005)Google Scholar
  15. 15.
    Kumar, M., Hanumanthappa, M., Kumar, T.V.S. Intrusion detection system for grid computing using SNORT. 2012 International Conference on Computing, Communication and Applications (ICCCA), 2012, 1–6Google Scholar
  16. 16.
    Lopez-Benitez, N.: Petri-net based performance-evaluation of distributed homogeneous task systems. IEEE Trans. Reliab. 2(49), 188–198 (2000)CrossRefGoogle Scholar
  17. 17.
    Chen, T.M., Sanchez-Aarnoutse, J.C., Buford, J.: Petri net modeling of cyber-physical attacks on smart grid. IEEE Trans. Smart Grid 2(4), 741–749 (2011)CrossRefGoogle Scholar
  18. 18.
    Mitchell, R., Chen, I.: Effect of intrusion detection and response on reliability of cyber physical systems. IEEE Trans. Reliab. 1(62), 199–210 (2013)Google Scholar
  19. 19.
    Zaitsev, D.A., Zaitsev, I.D., Shmeleva, T.R.: Infinite petri nets as models of grids, chapter 19. In: Khosrow-Pour, M. (ed.) Encyclopedia of Information Science and Technology, Vol 10, 3rd edn. IGI-Global, Pennsylvania (2014)Google Scholar
  20. 20.
    Jensen, K., Kristensen, L.M.: Coloured Petri Nets: Modelling and Validation of Concurrent Systems. Springer, Berlin (2009)CrossRefMATHGoogle Scholar
  21. 21.
    Aalst, W., Stahl, C.: Modeling Business Processes: A Petri Net-Oriented Approach. MIT Press, Cambridge (2011)MATHGoogle Scholar
  22. 22.
    Zaitsev, D.A.: Clans of Petri Nets: Verification of Protocols and Performance Evaluation of Networks. LAP LAMBERT Academic Publishing, Saarbrücken (2013)Google Scholar
  23. 23.
  24. 24.
    Baumgartner, N., Gottesheim, W., Mitsch, S., Retschitzegger, W., Schwinger, W.: Situation Prediction Nets. Springer, LNCS 6412, 202–218 (2010)Google Scholar
  25. 25.
    Kappel, G., Proll, B., Reich, S., Retschitzegger, W.: Web Engineering. Wiley, New York (2006)Google Scholar
  26. 26.
    MPI: A Message-Passing Interface Standard. Version 3.0. Message Passing Interface Forum, September 21 (2012)Google Scholar
  27. 27.
    Fox, G., Johnson, M., Lyzenga, G., Otto, S., Salmon, J., Walker, D.: Solving Problems on Concurrent Processors. Volume 1: General Techniques and Regular Problems. Prentice-Hall, Upper Saddle River (1988)Google Scholar
  28. 28.
    Douligeris, C., Mitrokotsa, A.: DDoS attacks and defense mechanisms: classification and state-of-the-art. Comput. Netw. 44(5), 643–666 (2004)Google Scholar
  29. 29.
    Kuzmanovic, A., Knightly, E.W.: Low-rate TCP-targeted denial of service attacks and counter strategies. IEEE/ACM Trans. Netw. 14(4), 683–696 (2006)CrossRefGoogle Scholar
  30. 30.
    Lu, Z., Wang, W., Wang, C.: Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications. Springer Briefs in Computer Science (2015)Google Scholar
  31. 31.
    Wang, K., Chen, J., Zhou, H., Qin, Y., Zhang, H.: Modeling denial-of-service against pending interest table in named data networking. Int. J. Commun. Syst. 27(12), 4355–4368 (2014)Google Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  • D. A. Zaitsev
    • 1
  • T. R. Shmeleva
    • 1
  • W. Retschitzegger
    • 2
  • B. Pröll
    • 2
  1. 1.International Humanitarian UniversityOdessaUkraine
  2. 2.Johannes Kepler UniversityLinzAustria

Personalised recommendations