Abstract
For any non-negative integer K, a K-observer P of a network N is a set of nodes in N such that each message, that travels at least K hops in N, is guaranteed to reach (and so can be observed by) at least one node in P. A K-observer P of a network N is minimum iff the number of nodes in P is no more than the number of nodes in every K-observer of N. The nodes in a minimum K-observer of a network N can be used to monitor the message traffic in network N and collect traffic statistics, detect patterns of denial-of-service attacks when they occur in N, and act as firewalls to identify and discard attack messages from network N. In this paper, we consider the problem of constructing a minimum K-observer for any given network. We show that the problem is NP hard for general networks, and give linear time algorithms for constructing minimum or near-minimum K-observers for special classes of networks: trees, rings, L-rings, and large grids.
Similar content being viewed by others
References
H. B. Acharya, A. Joshi, and M. G. Gouda, “Firewall modules and modular firewalls,” in Proc. 18th IEEE Int. Conf. Network Protocols (ICNP), Kyoto, Japan, 2010, pp. 174–182.
K. M. Alzoubi, P.-J. Wan, and O. Frieder, “Message-optimal connected dominating sets in mobile ad hoc networks,” in Proc. 3rd ACM Int. Symp. Mobile Ad Hoc Networking & Computing, Lausanne, Switzerland, 2002, pp. 157–164.
B. Armbruster, J. C. Smith, and K. Park, “A packet filter placement problem with application to defense against spoofed denial of service attacks,” Eur. J. Oper. Res., vol. 176, no. 2, pp. 1283–1292, Jan. 2007.
L. Breslau, I. Diakonikolas, N. Duffield, Y. Gu, M. Hajiaghayi, D. S. Johnson, H. Karloff, M. Resende, and S. Sen, “Disjoint-path facility location: Theory and practice,” in Proc. 13th Workshop Algorithm Engineering and Experiments (ALENEX), San Francisco, USA, 2011, pp. 60–74
K. Calvert, M. B. Doar, A. Nexion, and E. W. Zegura, “Modeling internet topology,” IEEE Commun. Mag., vol. 35, no. 6, pp. 160–163, Jun. 1997.
B. Chen, K. Jamieson, H. Balakrishnan, and R. Morris, “Span: an energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks,” Wireless Netw., vol. 8, no. 5, pp. 481–494, Sept. 2002.
V. Chvátal, “A combinatorial theorem in plane geometry,” J. Comb. Theory B, vol. 18, no. 1, pp. 39–41, Feb. 1975.
M. Faloutsos, P. Faloutsos, and C. Faloutsos, “On power-law relationships of the internet topology,” in Proc. Conf. Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM), Cambridge, USA, 1999, pp. 251–262.
M. R. Garey and D. S. Johnson, Computers and Intractability; A Guide to the Theory of NP-Completeness. New York: W. H. Freeman, 1990.
S. Meguerdichian, F. Koushanfar, M. Potkonjak, and M. B. Srivastava, “Coverage problems in wireless ad-hoc sensor networks,” in Proc. IEEE INFOCOM, Anchorage, USA, 2001, vol. 3, pp. 1380–1387.
L. Qiu, V. N. Padmanabhan, and G. M. Voelker, “On the placement of web server replicas,” in Proc. IEEE INFOCOM, Anchorage, USA, 2001, vol. 3, pp. 1587–1596.
T. Qiu, L. Ji, D. Pei, J. Wang, and J. Xu, “Towerdefense: Deployment strategies for battling against ip prefix hijacking,” in Proc. 18th IEEE Int. Conf. Network Protocols (ICNP), Kyoto, Japan, 2010, pp. 134–143.
J. Wu and H. Li, “On calculating connected dominating set for efficient routing in ad hoc wireless networks,” in Proc. 3rd Int. Workshop Discrete Algorithms and Methods for Mobile Computing and Communications (DIALM), Seattle, USA, 1999, pp. 7–14.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Acharya, H.B., Choi, T., Bazzi, R.A. et al. The K-observer problem in computer networks. Netw.Sci. 1, 15–22 (2012). https://doi.org/10.1007/s13119-011-0002-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13119-011-0002-7