DocumentCode :
1827464
Title :
Configuring networks with content filtering nodes with applications to network security
Author :
Kodialam, Murali ; Lakshman, T.V. ; Sengupta, Sudipta
Author_Institution :
Lucent Technol. Bell Labs, USA
Volume :
4
fYear :
2005
fDate :
13-17 March 2005
Firstpage :
2395
Abstract :
With the rapid increase in the frequency of worm attacks, there has been significant interest in developing network based mechanisms that slow or contain worm propagation. One suggested network-based approach is the use of special content filtering nodes that examine the complete content of each packet and block traffic that contain strings matching a pre-specified set of worm signatures. To be effective, containment systems need to have fast reaction times (content filtering with the appropriate signatures must be activated very soon after the start of an attack) and need to be comprehensive in the sense that every packet routed through the network must be examined at least once. Since network-based content filtering is expensive, it is desirable to make the best use of deployable content filtering capability. This requires intelligent placement of the content filtering nodes in the network and use of appropriate network routing to maximize the carried traffic. In this paper, we study the impact of the content filtering requirement on network capacity. First, we develop an intelligent heuristic for deployment of content filtering nodes in the network. Next, given a set of deployed content filtering nodes, we develop a fully polynomial time approximation scheme (FP-TAS) that maximizes the traffic carried by the network subject to the constraint that all traffic passes through a content filtering node at least once. Simulation studies using the developed schemes show that for large networks, most of the traffic can be examined even when only 10% of the network nodes are content filtering capable.
Keywords :
computer viruses; filtering theory; optimisation; polynomial approximation; telecommunication network routing; telecommunication security; telecommunication traffic; FP-TAS; containment system; content filtering node; fully polynomial time approximation scheme; maximization; network security; network traffic; network-based content filtering; packet routing; worm propagation; worm signatures; Computational modeling; Computer security; Computer worms; Filtering; Frequency; Intelligent networks; Polynomials; Routing; Telecommunication traffic; Traffic control;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE
ISSN :
0743-166X
Print_ISBN :
0-7803-8968-9
Type :
conf
DOI :
10.1109/INFCOM.2005.1498525
Filename :
1498525
Link To Document :
بازگشت