Top Banner
Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma de Madrid
36

Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.

Dec 29, 2015

Download

Documents

Rhoda Wells
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.

Optimal serverless networks

attacks, complexity and

some approximate

algorithms

Carlos Aguirre Maeso

Escuela Politécnica Superior

Universidad Autónoma de Madrid

Page 2: Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.

Network attacks● An attack is a set of objects of a network

(nodes and/or edges) that are disabled removed (from the graph).

● The goal of a given attack is to produce the maximum possible damage in terms of connectivity.

Page 3: Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.

Network attacks● The connectivity (resistance) of the graph after

the attack can be measured in different ways.• Number of nodes that are disconnected from a given

source node (server networks) (Aura et al.)

• Size of the biggest connected component (Albert-

Barabasi).

● The efficiency (damage) of an attack algorithm

for a given graph is the inverse of the resistance

of the graph to the attack

Page 4: Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.

Model of communication network

V={v1⋯v∣V∣}is the set of nodes

E={e1⋯e∣E∣}:V×V {0,1}is the set of edges

c :V∪E Z∢∪{∞}is a cost function

s : V [ 0,1 ] is a significance function

We model a communication network as a cuadruple

CN={V,E,c,s}:

Page 5: Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.

Network attacks● The cost function indicates how much costs

to a possible enemy to disable the element

● The relevance function indicates the

importance of the element, and therefore

how bad is that other nodes of the network

become disconnected with this node

Page 6: Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.

Network attacks● The cost of a given attack is the sum of the

costs of the elements that are removed

from the graph.

● The relevance of a set of nodes is the sum

of the relevances of the nodes in the set.

Page 7: Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.

Network attacks● For a given graph, we define the core of the

graph as the connected component with the

highest importance.

● We define the damage produced over a

communication network as the sum of the

significances of the elements that do not belong

to the core after the attack.

● The resistence of the network to the attack is

defined as the size of the core.

Page 8: Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.

Optimal network attacks● Now, the problem op the optimal attack can

be stablished in the following terms:● Problem OPT_ATTACK: Given a serverless

communication network CN and two fixed

values C and D, does there exist an attack A

such as C(A) <= C and $D(A) >= D ?

Page 9: Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.

Optimal network attacks● We look for attacks that produce the

maximal damage with the minimum cost.

● The problem of finding such attack is NP-

Complete (Aguirre et al.) even in the easier

case of bidirectional links, unbreakable

edges (nodes), identical cost for all nodes

(edges) and indentical importance for all

the nodes.

Page 10: Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.

NP-Completness● NP-Complete problems are problems that

verify two conditions● It is very hard to find a solution.

● But If we are presented a possible solution it is

easy to check if this solution meets the

conditions of the problem.

● This conditions makes this problems very

suitable for approximate algorithms.

Page 11: Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.

NP● In the OPT_ATTACK problem is very easy to check

is a possible solution meets the conditions of the

problem● We count the cost of the attack O(|E|)

● We find the connected components after the attack O(|E|+|

V|log|V|)

● We find the biggest connected component O(|V|)

● The damage now can be computed in O(|V|)

● To check if a possible solution meets the condition of

the problem takes a time O(|E|+|V|log|V|).

Page 12: Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.

Completness● To show the completness of the problem, we stablish

a polynomical reduction of this problem to other

known complete problem.

● For the OPT_ATTACK problem we stablish a

polynomical reduction with the problem of the

bisection of a graph.

● As the bisection problem is complete, our problem is

also complete.

Page 13: Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.
Page 14: Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.

CompletnessLemma: The original graph G has a bisection of size B <= |V|2/4

if and only if the serverles communication network G' has an

attack A with D(A)>= 1/2(|V|3/4+|V|)+|V|/2 and

C(A) <= 1/2(|V|3/4+|V|)+B.

Sketch of the proof:

For the only if part take as attack the edges of the bisection plus

the edges of the paths from the extra node to one of the sides of

G.

For the if part show that is such attacks exists the numbers of

nodes that are discconected from the extra node s cant not be

higher that |V|/2 or lower than |V|/2.

Page 15: Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.

CompletnessThe same theorem can be stablished for attacks where only

edges can be attacked. For a graph G consider the following

graph G'

where only the white nodes can be attacked and apply the

previous theorem.

Page 16: Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.

Approximate Algorithms for Attacks

● Random Walks, Brownian methods.

● Minimal Cuts (Shamir)

● Random Failure (Albert-Barabasi)

● Maximal node degree (Albert-Barabasi)

● Minimal All-Paths (Newman).

● Minimal Single Path (Aguirre et al.)

Page 17: Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.

Random Attack (Failure)

Failure

j= 1

while j < n

node=aleat(V)

V = V - node

j++

End Failure

Failure has a computational complexity O(n)

Page 18: Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.

Degree Based Attack

AttackDegree

j= 1

while j < n

node=MostConected(V)

V = V - node

j++

End Attack

● AttackDegree has a computational complexity O(n2)

Page 19: Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.

MinPath Based AttackAttackMinPath

j= 1

while j < n

For each u in V

ind[u]=0

For each u,v in V

C = minimal path from u to v

for each node k in C

ind[k]++

node= k such as the value ind[k] is maximum

V = V - node

j++

End AttackMinPath

MinPath has a computational complexity O(n3), this order can be reduced by selecting only a subset of the set of pairs of nodes in the graph

Page 20: Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.

Graph topologies

● A given attack algorithm has different efficiencies in

different kinds of graphs.

● This means that before selecting an attack algorithm is

usually a good idea to know what kind of graph is going

to be attacked and select the best attack algorithm for

that graph.

● The graphs are classified using their intrinsic metrics

Page 21: Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.

Metrics

● Esparsity (E/V)

● Node degree distribution

● Average degree (<k>)

● Cluster Coefficient (C)

● Characteristic Path (L)

● Number of biconnected components (B)

Page 22: Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.

1830.7518.77HIERARCHIC

NETW. 4280.05615.808POWER GRID

60.0043.89RANDOM

10.01863.409SCALE-FREE

10.1573.744MIXED

10.62614.2SMALL-WORLD

10.643125.438RING-LATTICE

BCL

Page 23: Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.

Network models

● Random Networks

● Regular Networks (Rings, grids)

● Small-World

● Scale Free

● Hierarchical networks

● Real Networks

Page 24: Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.

Small-World

Page 25: Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.

Ring

Page 26: Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.

Scale-Free

Page 27: Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.

Mix

Page 28: Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.

Random

Page 29: Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.

Hierarchic

Page 30: Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.

Power Grid

Page 31: Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.

Failure

Page 32: Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.

Attack Degree

Page 33: Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.

Attack Flow

Page 34: Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.
Page 35: Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.
Page 36: Optimal serverless networks attacks, complexity and some approximate algorithms Carlos Aguirre Maeso Escuela Politécnica Superior Universidad Autónoma.