Skip to main content
Log in

Security of grid structures under disguised traffic attacks

  • Published:
Cluster Computing Aims and scope Submit manuscript


Models of rectangular grid structures were constructed in the form of a colored Petri net. The basic model consists of a matrix of switching nodes that deliver packets to computing nodes which are attached to the matrix borders and produce and consume packets. Since grid structures are often employed to solve boundary value problems, square and torus surfaces were studied and generalized to hypercube and hypertorus in multidimensional space using a grid node that aggregates switching and computing nodes. Traffic guns were added to the models to represent traffic attacks. Simulation in CPN Tools revealed simple and dangerous traffic gun configurations, such as a traffic duel, focus, crossfire, and side shot, which bring the grid to complete deadlock at less than 5 % of the grid peak load. Comparably low gun intensity targeted to induce deadlock areas within a grid (network) is a key characteristic of disguised traffic attacks. The aim of future work will be to develop counter-measures for these attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others


  1. Grid and Cloud Computing: Concepts, Methodologies, Tools and Applications, vol. 4. Information Resources Management Association (USA), IGI-Global (2012).

  2. Preve, N.P. (ed.): Grid Computing: Towards a Global Interconnected Infrastructure. Springer, London (2011)

  3. Roosta, S.H.: Parallel Processing and Parallel Algorithms. Springer, New York (2006)

    MATH  Google Scholar 

  4. Ranka, S., Sahni, S.: Hypercube Algorithms: with Application to Image Processing and Pattern Recognition. Springer, New York (2011)

    MATH  Google Scholar 

  5. Borzi, A., Schulz, V.: Computational Optimization of Systems Governed by Partial Differential Equations. SIAM, Philadelphia (2012)

    MATH  Google Scholar 

  6. Dennis Jr., J.R., Schnabel, R.B.: Numerical Methods for Unconstrained Optimization and Nonlinear Equations. SIAM, Philadelphia (1996)

    Book  MATH  Google Scholar 

  7. Jovanovic, B.S., Suli, E.: Analysis of Finite Difference Schemes. Springer, London (2014)

    Book  MATH  Google Scholar 

  8. Garland, W.J.: Reactor Physics: Numerical Methods. Ontario University, Ontario (2004)

    Google Scholar 

  9. Miyamoto, K.: Plasma Physics and Controlled Nuclear Fusion. Springer, Berlin (2005)

    MATH  Google Scholar 

  10. Shooman, M.L.: Reliability of Computer Systems and Networks: Fault Tolerance, Analysis, and Design. Wiley, New York (2002)

    Book  Google Scholar 

  11. Dai, Yuan-Shun, Levitin, G.: Optimal resource allocation for maximizing performance and reliability in tree-structured grid services. IEEE Trans. Reliab. 3(56), 444–453 (2007)

    Article  Google Scholar 

  12. Levitin, G., Dai, Y.S., Ben-Haim, H.: Reliability and performance of star topology grid service with precedence constraints on subtask execution. IEEE Trans. Reliab. 3(55), 507–515 (2006)

    Article  Google Scholar 

  13. Lai, Pao-Lien: A systematic algorithm for identifying faults on hypercube-like networks under the comparison model. IEEE Trans. Reliab. 2(61), 452–459 (2012)

    Article  Google Scholar 

  14. Jie, Wu, Gao, Feng, Li, Zhongcheng, Min, Yinghua: Optimal, and reliable communication in hypercubes using extended safety vectors. IEEE Trans. Reliab. 3(54), 402–411 (2005)

    Google Scholar 

  15. Kumar, M., Hanumanthappa, M., Kumar, T.V.S. Intrusion detection system for grid computing using SNORT. 2012 International Conference on Computing, Communication and Applications (ICCCA), 2012, 1–6

  16. Lopez-Benitez, N.: Petri-net based performance-evaluation of distributed homogeneous task systems. IEEE Trans. Reliab. 2(49), 188–198 (2000)

    Article  Google Scholar 

  17. Chen, T.M., Sanchez-Aarnoutse, J.C., Buford, J.: Petri net modeling of cyber-physical attacks on smart grid. IEEE Trans. Smart Grid 2(4), 741–749 (2011)

    Article  Google Scholar 

  18. Mitchell, R., Chen, I.: Effect of intrusion detection and response on reliability of cyber physical systems. IEEE Trans. Reliab. 1(62), 199–210 (2013)

  19. Zaitsev, D.A., Zaitsev, I.D., Shmeleva, T.R.: Infinite petri nets as models of grids, chapter 19. In: Khosrow-Pour, M. (ed.) Encyclopedia of Information Science and Technology, Vol 10, 3rd edn. IGI-Global, Pennsylvania (2014)

    Google Scholar 

  20. Jensen, K., Kristensen, L.M.: Coloured Petri Nets: Modelling and Validation of Concurrent Systems. Springer, Berlin (2009)

    Book  MATH  Google Scholar 

  21. Aalst, W., Stahl, C.: Modeling Business Processes: A Petri Net-Oriented Approach. MIT Press, Cambridge (2011)

    MATH  Google Scholar 

  22. Zaitsev, D.A.: Clans of Petri Nets: Verification of Protocols and Performance Evaluation of Networks. LAP LAMBERT Academic Publishing, Saarbrücken (2013)

    Google Scholar 


  24. Baumgartner, N., Gottesheim, W., Mitsch, S., Retschitzegger, W., Schwinger, W.: Situation Prediction Nets. Springer, LNCS 6412, 202–218 (2010)

    Google Scholar 

  25. Kappel, G., Proll, B., Reich, S., Retschitzegger, W.: Web Engineering. Wiley, New York (2006)

    Google Scholar 

  26. MPI: A Message-Passing Interface Standard. Version 3.0. Message Passing Interface Forum, September 21 (2012)

  27. Fox, G., Johnson, M., Lyzenga, G., Otto, S., Salmon, J., Walker, D.: Solving Problems on Concurrent Processors. Volume 1: General Techniques and Regular Problems. Prentice-Hall, Upper Saddle River (1988)

    Google Scholar 

  28. Douligeris, C., Mitrokotsa, A.: DDoS attacks and defense mechanisms: classification and state-of-the-art. Comput. Netw. 44(5), 643–666 (2004)

  29. Kuzmanovic, A., Knightly, E.W.: Low-rate TCP-targeted denial of service attacks and counter strategies. IEEE/ACM Trans. Netw. 14(4), 683–696 (2006)

    Article  Google Scholar 

  30. Lu, Z., Wang, W., Wang, C.: Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications. Springer Briefs in Computer Science (2015)

  31. Wang, K., Chen, J., Zhou, H., Qin, Y., Zhang, H.: Modeling denial-of-service against pending interest table in named data networking. Int. J. Commun. Syst. 27(12), 4355–4368 (2014)

Download references


The authors would like to thank M. Perrone from IBM for his help in improving the readability of the paper. The work is supported by the OeAD Grant UA 07/2013 of the Austria-Ukraine collaboration program.

Author information

Authors and Affiliations


Corresponding author

Correspondence to D. A. Zaitsev.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zaitsev, D.A., Shmeleva, T.R., Retschitzegger, W. et al. Security of grid structures under disguised traffic attacks. Cluster Comput 19, 1183–1200 (2016).

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: