Research Article
A Persistent Route Diversification Mechanism for Defending against Stealthy Crossfire Attack
| Notation | Description |
| | An undirected graph of data plane, | | A set of all nodes in the data plane, | | A set of switches, | | A set of end hosts, | | A set of links connecting switches, | | The forwarding path starting from to that is a sequence of nodes, i.e., | | PRs under attack, | | A set of THs, | | The period for link statistics sampling | | Link throughput smoothing period | | The minimum congestion level threshold value | | The minimum attack time threshold on a PR identified as in the renaissance attack stage | | The proxy of | | A defense policy, denoted as , where , , and are proxy creation, diverging, and suppressing countermeasures, respectively | | The congestion level of at the time tick of | | The time tick | | The minimum proportional threshold for identifying a threatened host as a victim decoy |
|
|