Abstract
Multi-service computer networks (MSCN) play an important role in the modern society life. However, design of MSCN is a rather complex challenge. Development of adaptive routing algorithms, which consider the failures of nodes and communication lines because of the impact of the computer attacks, holds a specific place in MSCN design. The paper offers a new approach to adaptive routing in MSCN based on a combined use of the multi-path routing of data streams and the integral criterion, which is based on fuzzy assessment of network states. The algorithm based on this approach considers additional routing metrics, i.e. the level of information security, the technical state of network elements and the packet loss probability. The experimental assessment of the offered algorithm of fuzzy adaptive routing showed that in the conditions of high level impact of computer attacks the gain in the time of message delay is improved by 2–4 times. It testifies about higher performance of the proposed algorithm in comparison with known algorithms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ash, G.R.: Dynamic Routing in Telecommunications Networks. McGraw-Hill Professional, New York City (1997)
Braun, H.W.: Models of Policy Based Routing. RFC Editor, United States (1989)
Clark, D.D.: Policy Routing in Internet Protocols. RFC Editor, United States (1989)
Glass, C.J., Ni, L.M.: The turn model for adaptive routing. In: Proceedings of the 19th Annual International Symposium on Computer Architecture (ISCA 1992), pp. 278–287. ACM, New York (1992)
Qiu, L., Yang, Y.R., Zhang, Y., Xie, H.: On self adaptive routing in dynamic environments - an evaluation and design using a simple, probabilistic scheme. In: Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP 2004), pp. 12–23. IEEE Computer Society, Washington (2004)
Awerbuch, B., Holmer, D., Rubens, H., Kleinberg, R.: Provably competitive adaptive routing. In: Proceedings of INFOCOM 2005, vol. 1, pp. 631–641. IEEE (2005)
Kim, J., Dally, W.J., Abts, D.: Adaptive routing in high-radix clos network. In: Proceedings of the 2006 ACM/IEEE Conference on Supercomputing (SC 2006), Article 92. ACM, New York (2006)
Geoffray, P., Hoefler, T.: Adaptive routing strategies for modern high performance networks. In: Proceedings of 16th IEEE Symposium on High Performance Interconnects (HOTI 2008), pp. 165–174. IEEE, Stanford (2008)
Lakkakorpi, J., Pitkänen, M., Ott, J.: Adaptive routing in mobile opportunistic networks. In: Proceedings of the 13th ACM International Conference on Modeling, Analysis, and Simulation of Wireless and Mobile Systems (MSWIM 2010), pp. 101–109. ACM (2010)
Comer, D.E.: Internetworking with TCP/IP, Volume I: Principles, Protocols, and Architecture. Prentice Hall PTR, Upper Saddle River (2000)
Black, U.: IP Routing Protocols: RIP, OSPF, BGP, PNNI & Cisco Routing Protocols. Prentice Hall PTR, Upper Saddle River (2000)
Armitage, G.: Quality of Service in IP Networks. Macmillan Technical Publishing, Indianapolis (2000)
Balchunas, A.: Routing Information Protocol (RIP v1.03). http://www.routeralley.com. Accessed 03 Oct 2017
A Border Gateway Protocol 4 (BGP-4). https://tools.ietf.org/html/rfc1771. Accessed 03 Oct 2017
OSPF Version 2. https://tools.ietf.org/html/rfc1247. Accessed 03 Oct 2017
Difference Between IGRP and EIGRP. http://www.differencebetween.net/technology/internet/difference-between-igrp-and-eigrp. Accessed 03 Oct 2017
Gredler, H., Goralski, W.: The Complete IS-IS Routing Protocol. Springer, Heidelberg (2005)
Kleinrock, L.: Queueing Systems, Volume I: Theory. Wiley, New York (1975)
Kleinrock, L.: Queueing Systems, Volume II: Computer Application. Wiley, New York (1976)
Bertsekas, D., Gallager, R.: Data Networks. Prentice Hall, Englewood Cliffs (1992)
Gerla, M., Kleinrock, L.: On the topological design of distributed computer networks. IEEE Trans. Commun. 25(1), 48–53 (1977)
Dannis, J.E., More, J.J.: Quasi-Newton methods, motivation and theory. SIAM Rev. 19(1), 46–89 (1977)
Daniel, J.W.: The approximate minimization of functional. Prentice Hall, Englewood Cliffs (1971)
Fratta, L., Gerla, M., Kleinrock, L.: The flow deviation method: an approach to store-and- forward communication network design. Networks 3(2), 97–133 (1973)
Kotenko, I., Saenko, I., Ageev, S.: Countermeasure security risks management in the Internet of Things based on fuzzy logic inference. In: Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2015), pp. 655–659 (2015)
Saenko, I., Ageev, S., Kotenko, I.: Detection of traffic anomalies in multi-service networks based on a fuzzy logical inference. In: Proceeding of the 10th International Symposium on Intelligent Distributed Computing (IDC 2016), pp. 79–88 (2016)
Acknowledgements
This research is being supported by the grants of the RFBR (15-07-07451, 16-37-00338, 16-29-09482), partial support of budgetary subjects 0073-2015-0004 and 0073-2015-0007, and Grant 074-U01.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Kotenko, I., Saenko, I., Ageev, S. (2018). Fuzzy Adaptive Routing in Multi-service Computer Networks under Cyber Attack Implementation. In: Abraham, A., Kovalev, S., Tarassov, V., Snasel, V., Vasileva, M., Sukhanov, A. (eds) Proceedings of the Second International Scientific Conference “Intelligent Information Technologies for Industry” (IITI’17). IITI 2017. Advances in Intelligent Systems and Computing, vol 679. Springer, Cham. https://doi.org/10.1007/978-3-319-68321-8_22
Download citation
DOI: https://doi.org/10.1007/978-3-319-68321-8_22
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-68320-1
Online ISBN: 978-3-319-68321-8
eBook Packages: EngineeringEngineering (R0)