Research Article

A Persistent Route Diversification Mechanism for Defending against Stealthy Crossfire Attack

Table 1

Mathematical notations.

NotationDescription

An undirected graph of data plane,
A set of all nodes in the data plane,
A set of switches,
A set of end hosts,
A set of links connecting switches,
The forwarding path starting from to that is a sequence of nodes, i.e.,
PRs under attack,
A set of THs,
The period for link statistics sampling
Link throughput smoothing period
The minimum congestion level threshold value
The minimum attack time threshold on a PR identified as in the renaissance attack stage
The proxy of
A defense policy, denoted as , where , , and are proxy creation, diverging, and suppressing countermeasures, respectively
The congestion level of at the time tick of
The time tick
The minimum proportional threshold for identifying a threatened host as a victim decoy