Abstract
Models of rectangular grid structures were constructed in the form of a colored Petri net. The basic model consists of a matrix of switching nodes that deliver packets to computing nodes which are attached to the matrix borders and produce and consume packets. Since grid structures are often employed to solve boundary value problems, square and torus surfaces were studied and generalized to hypercube and hypertorus in multidimensional space using a grid node that aggregates switching and computing nodes. Traffic guns were added to the models to represent traffic attacks. Simulation in CPN Tools revealed simple and dangerous traffic gun configurations, such as a traffic duel, focus, crossfire, and side shot, which bring the grid to complete deadlock at less than 5 % of the grid peak load. Comparably low gun intensity targeted to induce deadlock areas within a grid (network) is a key characteristic of disguised traffic attacks. The aim of future work will be to develop counter-measures for these attacks.
Similar content being viewed by others
References
Grid and Cloud Computing: Concepts, Methodologies, Tools and Applications, vol. 4. Information Resources Management Association (USA), IGI-Global (2012). http://www.igi-global.com/book/grid-cloud-computing/60756
Preve, N.P. (ed.): Grid Computing: Towards a Global Interconnected Infrastructure. Springer, London (2011)
Roosta, S.H.: Parallel Processing and Parallel Algorithms. Springer, New York (2006)
Ranka, S., Sahni, S.: Hypercube Algorithms: with Application to Image Processing and Pattern Recognition. Springer, New York (2011)
Borzi, A., Schulz, V.: Computational Optimization of Systems Governed by Partial Differential Equations. SIAM, Philadelphia (2012)
Dennis Jr., J.R., Schnabel, R.B.: Numerical Methods for Unconstrained Optimization and Nonlinear Equations. SIAM, Philadelphia (1996)
Jovanovic, B.S., Suli, E.: Analysis of Finite Difference Schemes. Springer, London (2014)
Garland, W.J.: Reactor Physics: Numerical Methods. Ontario University, Ontario (2004)
Miyamoto, K.: Plasma Physics and Controlled Nuclear Fusion. Springer, Berlin (2005)
Shooman, M.L.: Reliability of Computer Systems and Networks: Fault Tolerance, Analysis, and Design. Wiley, New York (2002)
Dai, Yuan-Shun, Levitin, G.: Optimal resource allocation for maximizing performance and reliability in tree-structured grid services. IEEE Trans. Reliab. 3(56), 444–453 (2007)
Levitin, G., Dai, Y.S., Ben-Haim, H.: Reliability and performance of star topology grid service with precedence constraints on subtask execution. IEEE Trans. Reliab. 3(55), 507–515 (2006)
Lai, Pao-Lien: A systematic algorithm for identifying faults on hypercube-like networks under the comparison model. IEEE Trans. Reliab. 2(61), 452–459 (2012)
Jie, Wu, Gao, Feng, Li, Zhongcheng, Min, Yinghua: Optimal, and reliable communication in hypercubes using extended safety vectors. IEEE Trans. Reliab. 3(54), 402–411 (2005)
Kumar, M., Hanumanthappa, M., Kumar, T.V.S. Intrusion detection system for grid computing using SNORT. 2012 International Conference on Computing, Communication and Applications (ICCCA), 2012, 1–6
Lopez-Benitez, N.: Petri-net based performance-evaluation of distributed homogeneous task systems. IEEE Trans. Reliab. 2(49), 188–198 (2000)
Chen, T.M., Sanchez-Aarnoutse, J.C., Buford, J.: Petri net modeling of cyber-physical attacks on smart grid. IEEE Trans. Smart Grid 2(4), 741–749 (2011)
Mitchell, R., Chen, I.: Effect of intrusion detection and response on reliability of cyber physical systems. IEEE Trans. Reliab. 1(62), 199–210 (2013)
Zaitsev, D.A., Zaitsev, I.D., Shmeleva, T.R.: Infinite petri nets as models of grids, chapter 19. In: Khosrow-Pour, M. (ed.) Encyclopedia of Information Science and Technology, Vol 10, 3rd edn. IGI-Global, Pennsylvania (2014)
Jensen, K., Kristensen, L.M.: Coloured Petri Nets: Modelling and Validation of Concurrent Systems. Springer, Berlin (2009)
Aalst, W., Stahl, C.: Modeling Business Processes: A Petri Net-Oriented Approach. MIT Press, Cambridge (2011)
Zaitsev, D.A.: Clans of Petri Nets: Verification of Protocols and Performance Evaluation of Networks. LAP LAMBERT Academic Publishing, Saarbrücken (2013)
Baumgartner, N., Gottesheim, W., Mitsch, S., Retschitzegger, W., Schwinger, W.: Situation Prediction Nets. Springer, LNCS 6412, 202–218 (2010)
Kappel, G., Proll, B., Reich, S., Retschitzegger, W.: Web Engineering. Wiley, New York (2006)
MPI: A Message-Passing Interface Standard. Version 3.0. Message Passing Interface Forum, September 21 (2012)
Fox, G., Johnson, M., Lyzenga, G., Otto, S., Salmon, J., Walker, D.: Solving Problems on Concurrent Processors. Volume 1: General Techniques and Regular Problems. Prentice-Hall, Upper Saddle River (1988)
Douligeris, C., Mitrokotsa, A.: DDoS attacks and defense mechanisms: classification and state-of-the-art. Comput. Netw. 44(5), 643–666 (2004)
Kuzmanovic, A., Knightly, E.W.: Low-rate TCP-targeted denial of service attacks and counter strategies. IEEE/ACM Trans. Netw. 14(4), 683–696 (2006)
Lu, Z., Wang, W., Wang, C.: Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications. Springer Briefs in Computer Science (2015)
Wang, K., Chen, J., Zhou, H., Qin, Y., Zhang, H.: Modeling denial-of-service against pending interest table in named data networking. Int. J. Commun. Syst. 27(12), 4355–4368 (2014)
Acknowledgments
The authors would like to thank M. Perrone from IBM for his help in improving the readability of the paper. The work is supported by the OeAD Grant UA 07/2013 of the Austria-Ukraine collaboration program.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zaitsev, D.A., Shmeleva, T.R., Retschitzegger, W. et al. Security of grid structures under disguised traffic attacks. Cluster Comput 19, 1183–1200 (2016). https://doi.org/10.1007/s10586-016-0582-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-016-0582-9