Distributed Chasing of Network Intruders elia Blin 1 Pierre - - PowerPoint PPT Presentation

distributed chasing of network intruders
SMART_READER_LITE
LIVE PREVIEW

Distributed Chasing of Network Intruders elia Blin 1 Pierre - - PowerPoint PPT Presentation

Intro Searching Model Results Conclusion Distributed Chasing of Network Intruders elia Blin 1 Pierre Fraigniaud 2 Nicolas Nisse 3 L Sandrine Vial 1 1 Universit e dEvry, France 2 CNRS, Universit e Paris-Sud, France 3 Universit e


slide-1
SLIDE 1

1/36 Intro Searching Model Results Conclusion

Distributed Chasing of Network Intruders

L´ elia Blin1 Pierre Fraigniaud2 Nicolas Nisse3 Sandrine Vial1

1Universit´

e d’Evry, France

2CNRS, Universit´

e Paris-Sud, France

3Universit´

e Paris-Sud, France.

R´ eunion FRAGILE, septembre 06

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-2
SLIDE 2

2/36 Intro Searching Model Results Conclusion

Plan

1

Introduction

2

Graph Searching

3

Our model

4

Our Results

5

Conclusion

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-3
SLIDE 3

3/36 Intro Searching Model Results Conclusion

Graph Searching

The Problem In a given network, whose edges are contaminated ; a team of searchers aims at clearing the network. We want to find a strategy that clears the netwok using the fewest searchers as possible. Motivations network security, speleological rescue, ...

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-4
SLIDE 4

3/36 Intro Searching Model Results Conclusion

Graph Searching

The Problem In a given network, whose edges are contaminated ; a team of searchers aims at clearing the network. We want to find a strategy that clears the netwok using the fewest searchers as possible. Motivations network security, speleological rescue, ...

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-5
SLIDE 5

4/36 Intro Searching Model Results Conclusion

Our Goal

Previous Algorithms input : a graph G

  • utput : an optimal search strategy for G

Our Approach : a distributed algorithm input : a graph G and a starting point v0 ∈ V (G)

  • utput : an “optimal” search strategy computed online by

the searchers themselves

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-6
SLIDE 6

4/36 Intro Searching Model Results Conclusion

Our Goal

Previous Algorithms input : a graph G

  • utput : an optimal search strategy for G

Our Approach : a distributed algorithm input : a graph G and a starting point v0 ∈ V (G)

  • utput : an “optimal” search strategy computed online by

the searchers themselves

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-7
SLIDE 7

5/36 Intro Searching Model Results Conclusion Definitions Connected

Plan

1

Introduction

2

Graph Searching Basic definitions Connected search

3

Our model

4

Our Results

5

Conclusion

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-8
SLIDE 8

6/36 Intro Searching Model Results Conclusion Definitions Connected

Search Strategy, Parson. [GTC,1978]

Sequence of three basic operations,. . .

1 Place a searcher at a vertex of the graph ; 2 Move a searcher along an edge of the graph ; 3 Remove a searcher from a vertex of the graph.

. . . that must result in clearing the graph An edge is cleared when it is traversed by a searcher. A clear edge e is recontaminated if it exits a non-guarded path between e and a contaminated edge. We want to minimize the number of searchers. Let s(G) be the search number of the graph G.

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-9
SLIDE 9

7/36 Intro Searching Model Results Conclusion Definitions Connected

Simple Examples : Path and Ring

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-10
SLIDE 10

7/36 Intro Searching Model Results Conclusion Definitions Connected

Simple Examples : Path and Ring

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-11
SLIDE 11

7/36 Intro Searching Model Results Conclusion Definitions Connected

Simple Examples : Path and Ring

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-12
SLIDE 12

7/36 Intro Searching Model Results Conclusion Definitions Connected

Simple Examples : Path and Ring

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-13
SLIDE 13

7/36 Intro Searching Model Results Conclusion Definitions Connected

Simple Examples : Path and Ring

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-14
SLIDE 14

7/36 Intro Searching Model Results Conclusion Definitions Connected

Simple Examples : Path and Ring

s(Path)=1

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-15
SLIDE 15

7/36 Intro Searching Model Results Conclusion Definitions Connected

Simple Examples : Path and Ring

s(Path)=1

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-16
SLIDE 16

7/36 Intro Searching Model Results Conclusion Definitions Connected

Simple Examples : Path and Ring

s(Path)=1

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-17
SLIDE 17

7/36 Intro Searching Model Results Conclusion Definitions Connected

Simple Examples : Path and Ring

s(Path)=1

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-18
SLIDE 18

7/36 Intro Searching Model Results Conclusion Definitions Connected

Simple Examples : Path and Ring

s(Path)=1

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-19
SLIDE 19

7/36 Intro Searching Model Results Conclusion Definitions Connected

Simple Examples : Path and Ring

s(Path)=1

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-20
SLIDE 20

7/36 Intro Searching Model Results Conclusion Definitions Connected

Simple Examples : Path and Ring

s(Path)=1 s(Ring)=2

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-21
SLIDE 21

8/36 Intro Searching Model Results Conclusion Definitions Connected

Drawbacks of Parson’s model :

In the standard settings :

1 the topology of the graph is known ; 2 a search strategy is performed in a sequential synchronous

way ;

3 searchers can be placed anywhere in the graph.

In a real network :

1 searchers have no knowledge about the topology ; 2 networks are asynchronous ; 3 searchers cannot be teleported,

communications must be secure, ⇒ the clear part must induce a connected subgraph.

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-22
SLIDE 22

9/36 Intro Searching Model Results Conclusion Definitions Connected

Monotone connected graph searching

Monotone connected search strategy connectedness : At any step of the strategy, the clear part must induce a connected subgraph. monotony : No recontamination ever occurs. Once an edge has been cleared, it remains clear until the end. Monotone connected search number Let mcs(G) be the smallest number of searchers required to clear the graph in a monotone connected manner.

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-23
SLIDE 23

10/36 Intro Searching Model Results Conclusion Definitions Connected

Cost of Connectedness : Example in a tree

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-24
SLIDE 24

10/36 Intro Searching Model Results Conclusion Definitions Connected

Cost of Connectedness : Example in a tree

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-25
SLIDE 25

10/36 Intro Searching Model Results Conclusion Definitions Connected

Cost of Connectedness : Example in a tree

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-26
SLIDE 26

10/36 Intro Searching Model Results Conclusion Definitions Connected

Cost of Connectedness : Example in a tree

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-27
SLIDE 27

10/36 Intro Searching Model Results Conclusion Definitions Connected

Cost of Connectedness : Example in a tree

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-28
SLIDE 28

10/36 Intro Searching Model Results Conclusion Definitions Connected

Cost of Connectedness : Example in a tree

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-29
SLIDE 29

10/36 Intro Searching Model Results Conclusion Definitions Connected

Cost of Connectedness : Example in a tree

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-30
SLIDE 30

10/36 Intro Searching Model Results Conclusion Definitions Connected

Cost of Connectedness : Example in a tree

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-31
SLIDE 31

10/36 Intro Searching Model Results Conclusion Definitions Connected

Cost of Connectedness : Example in a tree

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-32
SLIDE 32

10/36 Intro Searching Model Results Conclusion Definitions Connected

Cost of Connectedness : Example in a tree

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-33
SLIDE 33

10/36 Intro Searching Model Results Conclusion Definitions Connected

Cost of Connectedness : Example in a tree

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-34
SLIDE 34

10/36 Intro Searching Model Results Conclusion Definitions Connected

Cost of Connectedness : Example in a tree

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-35
SLIDE 35

10/36 Intro Searching Model Results Conclusion Definitions Connected

Cost of Connectedness : Example in a tree

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-36
SLIDE 36

10/36 Intro Searching Model Results Conclusion Definitions Connected

Cost of Connectedness : Example in a tree

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-37
SLIDE 37

10/36 Intro Searching Model Results Conclusion Definitions Connected

Cost of Connectedness : Example in a tree

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-38
SLIDE 38

10/36 Intro Searching Model Results Conclusion Definitions Connected

Cost of Connectedness : Example in a tree

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-39
SLIDE 39

10/36 Intro Searching Model Results Conclusion Definitions Connected

Cost of Connectedness : Example in a tree

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-40
SLIDE 40

10/36 Intro Searching Model Results Conclusion Definitions Connected

Cost of Connectedness : Example in a tree

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-41
SLIDE 41

10/36 Intro Searching Model Results Conclusion Definitions Connected

Cost of Connectedness : Example in a tree

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-42
SLIDE 42

10/36 Intro Searching Model Results Conclusion Definitions Connected

Cost of Connectedness : Example in a tree

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-43
SLIDE 43

10/36 Intro Searching Model Results Conclusion Definitions Connected

Cost of Connectedness : Example in a tree

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-44
SLIDE 44

10/36 Intro Searching Model Results Conclusion Definitions Connected

Cost of Connectedness : Example in a tree

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-45
SLIDE 45

10/36 Intro Searching Model Results Conclusion Definitions Connected

Cost of Connectedness : Example in a tree

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-46
SLIDE 46

10/36 Intro Searching Model Results Conclusion Definitions Connected

Cost of Connectedness : Example in a tree

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-47
SLIDE 47

10/36 Intro Searching Model Results Conclusion Definitions Connected

Cost of Connectedness : Example in a tree

mcs(T) ≥ 4 > s(T)

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-48
SLIDE 48

11/36 Intro Searching Model Results Conclusion Definitions Connected

Cost of connectedness : Related Work

In terms of number of searchers For any tree T, s(T) ≤ mcs(T) ≤ 2 s(T) − 2 (tight). Barri` ere, Fraigniaud, Santoro and Thilikos. [WG, 2003] For any graph G, s(G) ≤ mcs(G) ≤ (1 + log n) s(G) Fraigniaud and Nisse [LATIN, 2006] Complexity of monotone connected Graph Searching NP-complete in general case.

  • Gustedt. [DAM, 1993]

Linear in case of trees. Barri` ere, Flocchini, Fraigniaud and Santoro. [SPAA, 2002]

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-49
SLIDE 49

12/36 Intro Searching Model Results Conclusion Search Network Agents

Plan

1

Introduction

2

Graph Searching

3

Our model Monotone Connected Search Asynchronous Anonymous Network Mobile Agents

4

Our Results

5

Conclusion

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-50
SLIDE 50

13/36 Intro Searching Model Results Conclusion Search Network Agents

Our Goal

For any connected, asynchronous, and anonymous network G, and any v0 ∈ V (G), we propose a distributed algorithm that enables clearing G in a connected way, using searchers starting from v0, and initially unaware of G.

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-51
SLIDE 51

14/36 Intro Searching Model Results Conclusion Search Network Agents

Monotone connected graph searching

Alternative definition v0 ∈ V (G) is the homebase of the searchers. Initially, any searcher is placed at v0. One single operation is allowed : move a searcher along an edge if it does not implie recontamination. Remarks The homebase remains clear during the whole strategy. mcs(G, v0)

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-52
SLIDE 52

15/36 Intro Searching Model Results Conclusion Search Network Agents

Importance of the homebase

u v

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-53
SLIDE 53

15/36 Intro Searching Model Results Conclusion Search Network Agents

Importance of the homebase

u v

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-54
SLIDE 54

15/36 Intro Searching Model Results Conclusion Search Network Agents

Importance of the homebase

u v

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-55
SLIDE 55

15/36 Intro Searching Model Results Conclusion Search Network Agents

Importance of the homebase

u v

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-56
SLIDE 56

15/36 Intro Searching Model Results Conclusion Search Network Agents

Importance of the homebase

u v

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-57
SLIDE 57

15/36 Intro Searching Model Results Conclusion Search Network Agents

Importance of the homebase

u v

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-58
SLIDE 58

15/36 Intro Searching Model Results Conclusion Search Network Agents

Importance of the homebase

u v

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-59
SLIDE 59

15/36 Intro Searching Model Results Conclusion Search Network Agents

Importance of the homebase

u v

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-60
SLIDE 60

15/36 Intro Searching Model Results Conclusion Search Network Agents

Importance of the homebase

u v

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-61
SLIDE 61

15/36 Intro Searching Model Results Conclusion Search Network Agents

Importance of the homebase

u v mcs(G,u)=2

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-62
SLIDE 62

15/36 Intro Searching Model Results Conclusion Search Network Agents

Importance of the homebase

u v

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-63
SLIDE 63

15/36 Intro Searching Model Results Conclusion Search Network Agents

Importance of the homebase

u v

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-64
SLIDE 64

15/36 Intro Searching Model Results Conclusion Search Network Agents

Importance of the homebase

u v

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-65
SLIDE 65

15/36 Intro Searching Model Results Conclusion Search Network Agents

Importance of the homebase

u v

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-66
SLIDE 66

15/36 Intro Searching Model Results Conclusion Search Network Agents

Importance of the homebase

u v

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-67
SLIDE 67

15/36 Intro Searching Model Results Conclusion Search Network Agents

Importance of the homebase

u v

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-68
SLIDE 68

15/36 Intro Searching Model Results Conclusion Search Network Agents

Importance of the homebase

u v mcs(G,v)=3

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-69
SLIDE 69

16/36 Intro Searching Model Results Conclusion Search Network Agents

Asynchronous Network

v v

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-70
SLIDE 70

16/36 Intro Searching Model Results Conclusion Search Network Agents

Asynchronous Network

v v

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-71
SLIDE 71

16/36 Intro Searching Model Results Conclusion Search Network Agents

Asynchronous Network

v v

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-72
SLIDE 72

16/36 Intro Searching Model Results Conclusion Search Network Agents

Asynchronous Network

v v

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-73
SLIDE 73

16/36 Intro Searching Model Results Conclusion Search Network Agents

Asynchronous Network

v v

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-74
SLIDE 74

16/36 Intro Searching Model Results Conclusion Search Network Agents

Asynchronous Network

The searchers cannot distinguish one graph from the other. The two red searchers have the same local behaviour. An extra searcher will be called in both cases. v v

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-75
SLIDE 75

17/36 Intro Searching Model Results Conclusion Search Network Agents

Cost of asynchronicity

More generally There exist graphs G such that, any distributed asynchronous graph searching protocol requires mcs(G) + 1 searchers to clear G in a connected monotone way. [FHL05] Coordinator The extra searcher, the coordinator is used to synchronize the

  • ther searchers.

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-76
SLIDE 76

18/36 Intro Searching Model Results Conclusion Search Network Agents

Anonymous Network

Unknown unknown topology unknown size (no upper bound) Anonymous No vertex labeling Local edge labeling Local Memory whiteboards are specific zone of local node memory, accessible in fair mutual exclusion.

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-77
SLIDE 77

19/36 Intro Searching Model Results Conclusion Search Network Agents

Example of an anonymous graph

1 4 3 2 2 3 4 1 2 1 3

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-78
SLIDE 78

20/36 Intro Searching Model Results Conclusion Search Network Agents

Mobile Agents

Searchers autonomous mobile computing entities with distincs IDs, running the same algorithm, Mealy automata.

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-79
SLIDE 79

20/36 Intro Searching Model Results Conclusion Search Network Agents

Mobile Agents

The decision of a searcher... leaving a node via some specific port, switching state, writing on the whiteboard, ... is local and depends on : current state, content of the node’s whiteboard, incoming port number.

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-80
SLIDE 80

21/36 Intro Searching Model Results Conclusion Search Network Agents

Related Work

Polynomial algorithms in specific topologies Trees. Barri` ere, Flocchini, Fraigniaud and Santoro. [SPAA, 2002] Hypercubes. Flocchini, Huang and Luccio. [IPDPS, 2005] Chordal rings, Tori, Meshes... For each of these classes of graphs :

1 mcs(G) + 1 searchers are used ; 2 each searcher possesses O(log n) bits of memory ; 3 the size of the node’s whiteboard is O(log n) bits. L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-81
SLIDE 81

21/36 Intro Searching Model Results Conclusion Search Network Agents

Related Work

Polynomial algorithms in specific topologies Trees. Barri` ere, Flocchini, Fraigniaud and Santoro. [SPAA, 2002] Hypercubes. Flocchini, Huang and Luccio. [IPDPS, 2005] Chordal rings, Tori, Meshes... For each of these classes of graphs :

1 mcs(G) + 1 searchers are used ; 2 each searcher possesses O(log n) bits of memory ; 3 the size of the node’s whiteboard is O(log n) bits. L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-82
SLIDE 82

22/36 Intro Searching Model Results Conclusion Theorem Algo

Plan

1

Introduction

2

Graph Searching

3

Our model

4

Our Results Theorem Our Algorithm

5

Conclusion

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-83
SLIDE 83

23/36 Intro Searching Model Results Conclusion Theorem Algo

Theorem

For any connected, asynchronous, and anonymous network G, and any u0 ∈ V (G), we propose an distributed algorithm that enables clearing G using searchers starting from the homebase u0, and initially unaware of G.

1 It uses at most k = mcs(G, u0) + 1 searchers if

mcs(G, u0) > 1, and k = 1 searcher if mcs(G, u0) = 1 ;

2 Every searcher involved in the search strategy computed

uses O(log k) bits of memory ;

3 During the execution, at most O(m log n) bits of

information are stored at every whiteboard.

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-84
SLIDE 84

23/36 Intro Searching Model Results Conclusion Theorem Algo

Theorem

For any connected, asynchronous, and anonymous network G, and any u0 ∈ V (G), we propose an distributed algorithm that enables clearing G using searchers starting from the homebase u0, and initially unaware of G.

1 It uses at most k = mcs(G, u0) + 1 searchers if

mcs(G, u0) > 1, and k = 1 searcher if mcs(G, u0) = 1 ;

2 Every searcher involved in the search strategy computed

uses O(log k) bits of memory ;

3 During the execution, at most O(m log n) bits of

information are stored at every whiteboard.

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-85
SLIDE 85

24/36 Intro Searching Model Results Conclusion Theorem Algo

Properties

the strategy is computed online by the searchers themselves. after the execution of our algorithm, an “optimal” monotone connected search strategy for G is written on the vertices’whiteboards in a distributed way. in the class of graphs with bounded mcs, searchers can be implemented by finite automata.

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-86
SLIDE 86

25/36 Intro Searching Model Results Conclusion Theorem Algo

Principles of our algorithm

The Algorithm Initially, one searcher stands at v0, k = 1 While the graph is not clear : Try all monotone connected search strategies using k searchers ; If the graph is not clear, call a new searcher ; Predicate At the end of each loop, the k searchers are standing at v0.

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-87
SLIDE 87

26/36 Intro Searching Model Results Conclusion Theorem Algo

Basic Idea

to order the possible strategies using k searchers ; to try all the strategies in the increasing order ; either a strategy clears the graph → OK ;

  • r after trying all the strategies, the graph remains

contaminated → another searcher is required.

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-88
SLIDE 88

27/36 Intro Searching Model Results Conclusion Theorem Algo

Valid moves

Two kind of moves are compatible with a monotone connected strategy

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-89
SLIDE 89

27/36 Intro Searching Model Results Conclusion Theorem Algo

Valid moves

Two kind of moves are compatible with a monotone connected strategy (1) A searcher at a clear (or guarded) vertex can move through any port.

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-90
SLIDE 90

27/36 Intro Searching Model Results Conclusion Theorem Algo

Valid moves

Two kind of moves are compatible with a monotone connected strategy (1) A searcher at a clear (or guarded) vertex can move through any port.

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-91
SLIDE 91

27/36 Intro Searching Model Results Conclusion Theorem Algo

Valid moves

Two kind of moves are compatible with a monotone connected strategy (1) A searcher at a clear (or guarded) vertex can move to help another searcher.

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-92
SLIDE 92

27/36 Intro Searching Model Results Conclusion Theorem Algo

Valid moves

Two kind of moves are compatible with a monotone connected strategy (1) A searcher at a clear (or guarded) vertex can move to help another searcher and then to clear an edge.

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-93
SLIDE 93

27/36 Intro Searching Model Results Conclusion Theorem Algo

Valid moves

Two kind of moves are compatible with a monotone connected strategy (1) A searcher at a clear (or guarded) vertex can move to help another searcher and then to clear an edge.

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-94
SLIDE 94

27/36 Intro Searching Model Results Conclusion Theorem Algo

Valid moves

Two kind of moves are compatible with a monotone connected strategy (2) A searcher at a vertex with only one contaminated port can move to clear an edge.

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-95
SLIDE 95

27/36 Intro Searching Model Results Conclusion Theorem Algo

Valid moves

Two kind of moves are compatible with a monotone connected strategy (2) A searcher at a vertex with only one contaminated port can move to clear an edge.

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-96
SLIDE 96

27/36 Intro Searching Model Results Conclusion Theorem Algo

Valid moves

Two kind of moves are compatible with a monotone connected strategy Such a configuration is the result of a failing strategy No moves are possible.

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-97
SLIDE 97

28/36 Intro Searching Model Results Conclusion Theorem Algo

Order on moves and strategies

Representation of valid moves (i, j, p) denotes : ”searcher i joins searcher j and the smallest searcher follows the port p to clear an edge” (i, i, p) denotes : ”searcher i follows the port p to clear the corresponding edge” The moves are ordered in the lexicographic order. Order on the sequences of valid moves A sequence of valid moves corresponds to a partial monotone connected search strategy. The sequence are ordered in the lexicographic order.

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-98
SLIDE 98

29/36 Intro Searching Model Results Conclusion Theorem Algo

The centralized Algorithm

k ≥ 1 being given, the centralized algorithm tries every strategy using k searchers, starting from v0. Initially, all searchers are at v0 ; Valid moves are performing one by one ; the smallest possible move is performed, if no valid move is possible, the last move performed is backtracked. A virtual stack contains the sequence of valid moves that have leaded to the current situation.

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-99
SLIDE 99

30/36 Intro Searching Model Results Conclusion Theorem Algo

The centralized Algorithm : Example

1 1 2 3 2 1 2 2 1 1 1 3 v0 number of searcher(s) : k=1 list of searcher(s) : Blue number of free searcher(s) : 0 | | | | | | | | | | | |

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-100
SLIDE 100

30/36 Intro Searching Model Results Conclusion Theorem Algo

The centralized Algorithm : Example

1 1 2 3 2 1 2 2 1 1 1 3 v0 number of searcher(s) : k=2 list of searcher(s) : Blue < Green number of free searcher(s) : 0 | | | | | | | | | | | |

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-101
SLIDE 101

30/36 Intro Searching Model Results Conclusion Theorem Algo

The centralized Algorithm : Example

1 1 2 3 2 1 2 2 1 1 1 3 v0 number of searcher(s) : k=2 list of searcher(s) : Blue < Green number of free searcher(s) : 0 | | | | | | | | | | | (B, B, 1) |

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-102
SLIDE 102

30/36 Intro Searching Model Results Conclusion Theorem Algo

The centralized Algorithm : Example

1 1 2 3 2 1 2 2 1 1 1 3 v0 number of searcher(s) : k=2 list of searcher(s) : Blue < Green number of free searcher(s) : 0 | | | | | | | | | (B, B, 2) | | (B, B, 1) |

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-103
SLIDE 103

30/36 Intro Searching Model Results Conclusion Theorem Algo

The centralized Algorithm : Example

1 1 2 3 2 1 2 2 1 1 1 3 v0 number of searcher(s) : k=2 list of searcher(s) : Blue < Green number of free searcher(s) : 0 | | | | | | | (G, G, 2) | | (B, B, 2) | | (B, B, 1) |

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-104
SLIDE 104

30/36 Intro Searching Model Results Conclusion Theorem Algo

The centralized Algorithm : Example

1 1 2 3 2 1 2 2 1 1 1 3 v0 number of searcher(s) : k=2 list of searcher(s) : Blue < Green number of free searcher(s) : 0 | | | | | | | | | (B, B, 2) | | (B, B, 1) |

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-105
SLIDE 105

30/36 Intro Searching Model Results Conclusion Theorem Algo

The centralized Algorithm : Example

1 1 2 3 2 1 2 2 1 1 1 3 v0 number of searcher(s) : k=2 list of searcher(s) : Blue < Green number of free searcher(s) : 0 | | | | | | | | | | | (B, B, 1) |

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-106
SLIDE 106

30/36 Intro Searching Model Results Conclusion Theorem Algo

The centralized Algorithm : Example

1 1 2 3 2 1 2 2 1 1 1 3 v0 number of searcher(s) : k=2 list of searcher(s) : Blue < Green number of free searcher(s) : 0 | | | | | | | | | | | |

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-107
SLIDE 107

30/36 Intro Searching Model Results Conclusion Theorem Algo

The centralized Algorithm : Example

1 1 2 3 2 1 2 2 1 1 1 3 v0 number of searcher(s) : k=2 list of searcher(s) : Blue < Green number of free searcher(s) : 0 | | | | | | | | | | | (B, B, 2) |

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-108
SLIDE 108

30/36 Intro Searching Model Results Conclusion Theorem Algo

The centralized Algorithm : Example

1 1 2 3 2 1 2 2 1 1 1 3 v0 number of searcher(s) : k=2 list of searcher(s) : Blue < Green number of free searcher(s) : 0 | | | | | | | | | (G, G, 1) | | (B, B, 2) |

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-109
SLIDE 109

30/36 Intro Searching Model Results Conclusion Theorem Algo

The centralized Algorithm : Example

1 1 2 3 2 1 2 2 1 1 1 3 v0 number of searcher(s) : k=2 list of searcher(s) : Blue < Green number of free searcher(s) : 0 | | | | | | | (G, G, 2) | | (G, G, 1) | | (B, B, 2) |

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-110
SLIDE 110

30/36 Intro Searching Model Results Conclusion Theorem Algo

The centralized Algorithm : Example

1 1 2 3 2 1 2 2 1 1 1 3 v0 number of searcher(s) : k=2 list of searcher(s) : Blue < Green number of free searcher(s) : 0 | | | | | | | | | | | |

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-111
SLIDE 111

30/36 Intro Searching Model Results Conclusion Theorem Algo

The centralized Algorithm : Example

1 1 2 3 2 1 2 2 1 1 1 3 v0 number of searcher(s) : k=3 list of searcher(s) : Blue < Green < Red number of free searcher(s) : 0 | | | | | | | | | | | |

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-112
SLIDE 112

30/36 Intro Searching Model Results Conclusion Theorem Algo

The centralized Algorithm : Example

1 1 2 3 2 1 2 2 1 1 1 3 v0 number of searcher(s) : k=3 list of searcher(s) : Blue < Green < Red number of free searcher(s) : 0 | | | | | | | | | | | (B, B, 1) |

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-113
SLIDE 113

30/36 Intro Searching Model Results Conclusion Theorem Algo

The centralized Algorithm : Example

1 1 2 3 2 1 2 2 1 1 1 3 v0 number of searcher(s) : k=3 list of searcher(s) : Blue < Green < Red number of free searcher(s) : 0 | | | | | | | | | (B, B, 2) | | (B, B, 1) |

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-114
SLIDE 114

30/36 Intro Searching Model Results Conclusion Theorem Algo

The centralized Algorithm : Example

1 1 2 3 2 1 2 2 1 1 1 3 v0 number of searcher(s) : k=3 list of searcher(s) : Blue < Green < Red number of free searcher(s) : 1(R) | | | | | | | (G, G, 2) | | (B, B, 2) | | (B, B, 1) |

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-115
SLIDE 115

30/36 Intro Searching Model Results Conclusion Theorem Algo

The centralized Algorithm : Example

1 1 2 3 2 1 2 2 1 1 1 3 v0 number of searcher(s) : k=3 list of searcher(s) : Blue < Green < Red number of free searcher(s) : 1(B) | | | | | (R, B, 1) | | (G, G, 2) | | (B, B, 2) | | (B, B, 1) |

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-116
SLIDE 116

30/36 Intro Searching Model Results Conclusion Theorem Algo

The centralized Algorithm : Example

1 1 2 3 2 1 2 2 1 1 1 3 v0 number of searcher(s) : k=3 list of searcher(s) : Blue < Green < Red number of free searcher(s) : 2(B,R) | | | (B, G, 2) | | (R, B, 1) | | (G, G, 2) | | (B, B, 2) | | (B, B, 1) |

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-117
SLIDE 117

30/36 Intro Searching Model Results Conclusion Theorem Algo

The centralized Algorithm : Example

1 1 2 3 2 1 2 2 1 1 1 3 v0 number of searcher(s) : k=3 list of searcher(s) : Blue < Green < Red number of free searcher(s) : 3(B,G,R) | (B, G, 3) | | (B, G, 2) | | (R, B, 1) | | (G, G, 2) | | (B, B, 2) | | (B, B, 1) |

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-118
SLIDE 118

30/36 Intro Searching Model Results Conclusion Theorem Algo

The centralized Algorithm : Example

1 1 2 3 2 1 2 2 1 1 1 3 v0 number of searcher(s) : k=3 list of searcher(s) : Blue < Green < Red number of free searcher(s) : 3(B,G,R) | (B, G, 3) | | (B, G, 2) | | (R, B, 1) | | (G, G, 2) | | (B, B, 2) | | (B, B, 1) | all searchers are free ⇒ the graph is clear

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-119
SLIDE 119

31/36 Intro Searching Model Results Conclusion Theorem Algo

Proof of the centralized Algorithm

1 only valid moves are performed → only valid strategies

are performed.

2 valid strategies are performed in the lexicographic order

→ all valid strategies are performed.

3 if the graph is clear, the algorithm stops and if all

strategies with k searchers have been tried, the algorithm ask for an extra searcher → our algorithm terminates.

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-120
SLIDE 120

32/36 Intro Searching Model Results Conclusion Theorem Algo

The distributed Algorithm

We aim to distribute the centralized algorithm Difficulties we had to address

  • nly one move at time : the coordinator acts like a token.

for backtracking : all actions performed by searchers are written in stacks distributed on the whiteboards. Somehow, the virtual stack of the centralized algorithm is distributed on the whiteboards.

  • ne searcher must be able to find another searcher : a

trace of any searcher is written in arrays on the whiteboards.

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-121
SLIDE 121

33/36 Intro Searching Model Results Conclusion Theorem Algo

Sketch of the distributed Algorithm

searcher 1 ... searcher k ... searcher 2 ... searcher i+1 ... ... ... searcher i searcher j>i ... Go p1 p2 p’1 p’2 L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-122
SLIDE 122

33/36 Intro Searching Model Results Conclusion Theorem Algo

Sketch of the distributed Algorithm

searcher 1 send Go to 2 ... searcher k ... searcher 2 receive Go from 1 ... searcher i+1 ... ... ... searcher i searcher j>i ... Go p1 p2 p’1 p’2 L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-123
SLIDE 123

33/36 Intro Searching Model Results Conclusion Theorem Algo

Sketch of the distributed Algorithm

searcher 1 send Go to 2 ... searcher k ... searcher 2 send Go to 3 receive Go from 1 ... searcher i+1 ... ... ... searcher i searcher j>i receive Go from i−1 ... Go p1 p2 p’1 p’2 L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-124
SLIDE 124

33/36 Intro Searching Model Results Conclusion Theorem Algo

Sketch of the distributed Algorithm

searcher j>i searcher 1 receive Go from i send Go to 2 ... searcher k ... searcher 2 send Go to 3 receive Go from 1 ... searcher i+1 ... ... Send Go to 1 ... searcher i ... receive Go from i−1 Clear by port p1 Go p1 p2 p’1 p’2 Arrive by p’1 L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-125
SLIDE 125

33/36 Intro Searching Model Results Conclusion Theorem Algo

Sketch of the distributed Algorithm

searcher j>i send Go to 2 searcher 1 receive Go from i send Go to 2 ... searcher k ... searcher 2 send Go to 3 receive Go from 1 ... searcher i+1 ... ... Send Go to 1 ... searcher i receive Go from 1 receive Go from i−1 ... Clear by port p1 Go p1 p2 p’1 p’2 Arrive by p’1 L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-126
SLIDE 126

33/36 Intro Searching Model Results Conclusion Theorem Algo

Sketch of the distributed Algorithm

searcher j>i send Go to 2 searcher 1 receive Go from i send Go to 2 ... searcher k ... searcher 2 send Go to 3 receive Go from 1 ... searcher i+1 ... ... Send Go to 1 ... searcher i receive Go from 1 send Go to 3 receive Go from i−1 ... Clear by port p1 receive Go from i−1 Go p1 p2 p’1 p’2 Arrive by p’1 L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-127
SLIDE 127

33/36 Intro Searching Model Results Conclusion Theorem Algo

Sketch of the distributed Algorithm

searcher j>i send Go to 2 ... receive Go from i−1 Clear by port p1 searcher 1 receive Go from i send Go to 2 ... searcher k ... searcher 2 send Go to 3 receive Go from 1 ... searcher i+1 ... ... Send Go to 1 ... searcher i receive Go from 1 send Go to 3 receive Go from i−1 Send Go to i+1 receive Go from i Go p1 p2 p’1 p’2 Arrive by p’1 L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-128
SLIDE 128

33/36 Intro Searching Model Results Conclusion Theorem Algo

Sketch of the distributed Algorithm

searcher j>i send Go to 2 ... receive Go from i−1 Clear by port p1 receive Go from j−1 searcher 1 receive Go from i send Go to 2 ... searcher k ... searcher 2 send Go to 3 receive Go from 1 ... searcher i+1 ... ... Send Go to 1 ... searcher i receive Go from 1 send Go to 3 receive Go from i−1 Send Go to i+1 receive Go from k−1 Send Go to i+2 Go p1 p2 p’1 p’2 Arrive by p’1 L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-129
SLIDE 129

33/36 Intro Searching Model Results Conclusion Theorem Algo

Sketch of the distributed Algorithm

searcher j>i send Go to 2 ... receive Go from i−1 Clear by port p1 receive Go from j−1 searcher 1 receive Go from i send Go to 2 ... searcher k ... searcher 2 send Go to 3 receive Go from 1 ... searcher i+1 ... ... Send Go to 1 ... searcher i receive Go from 1 send Go to 3 receive Go from i−1 Send Go to i+1 receive Go from i receive Go from k−1 Send Go to i+2 Send Go to j+1 Go p1 p2 p’1 p’2 Arrive by p’1 L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-130
SLIDE 130

33/36 Intro Searching Model Results Conclusion Theorem Algo

Sketch of the distributed Algorithm

searcher j>i send Go to 2 ... receive Go from i−1 Clear by port p1 receive Go from j−1 searcher 1 receive Go from i send Go to 2 ... searcher k ... searcher 2 send Go to 3 receive Go from 1 ... searcher i+1 ... ... Send Go to 1 ... searcher i receive Go from 1 send Go to 3 receive Go from i−1 Send Go to i+1 receive Go from i receive Go from k−1 Send Go to i+2 Send Go to j+1 Back p1 p2 p’1 p’2 Arrive by p’1 L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-131
SLIDE 131

33/36 Intro Searching Model Results Conclusion Theorem Algo

Sketch of the distributed Algorithm

searcher j>i send Go to 2 ... receive Go from i−1 Clear by port p1 receive Go from j−1 searcher 1 receive Go from i send Go to 2 ... searcher k ... searcher 2 send Go to 3 receive Go from 1 ... searcher i+1 ... ... Send Go to 1 ... searcher i receive Go from 1 send Go to 3 receive Go from i−1 Send Go to i+1 receive Go from i Back p1 p2 p’1 p’2 Arrive by p’1 L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-132
SLIDE 132

33/36 Intro Searching Model Results Conclusion Theorem Algo

Sketch of the distributed Algorithm

searcher j>i send Go to 2 searcher 1 receive Go from i send Go to 2 ... searcher k ... searcher 2 send Go to 3 receive Go from 1 ... searcher i+1 ... ... Send Go to 1 ... searcher i receive Go from 1 send Go to 3 receive Go from i−1 Send Go to i+1 receive Go from i ... receive Go from i−1 Clear by port p1 Back p1 p2 p’1 p’2 Arrive by p’1 L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-133
SLIDE 133

33/36 Intro Searching Model Results Conclusion Theorem Algo

Sketch of the distributed Algorithm

searcher j>i send Go to 2 ... receive Go from i−1 Clear by port p1 searcher 1 receive Go from i send Go to 2 ... searcher k ... searcher 2 send Go to 3 receive Go from 1 ... searcher i+1 ... ... Send Go to 1 ... searcher i receive Go from 1 send Go to 3 receive Go from i−1 Back p1 p2 p’1 p’2 Arrive by p’1 L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-134
SLIDE 134

33/36 Intro Searching Model Results Conclusion Theorem Algo

Sketch of the distributed Algorithm

searcher j>i send Go to 2 ... receive Go from i−1 Clear by port p1 searcher 1 receive Go from i send Go to 2 ... searcher k ... searcher 2 send Go to 3 receive Go from 1 ... searcher i+1 ... ... Send Go to 1 ... searcher i receive Go from 1 Back p1 p2 p’1 p’2 Arrive by p’1 L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-135
SLIDE 135

33/36 Intro Searching Model Results Conclusion Theorem Algo

Sketch of the distributed Algorithm

searcher j>i ... receive Go from i−1 Clear by port p1 searcher 1 receive Go from i send Go to 2 ... searcher k ... searcher 2 send Go to 3 receive Go from 1 ... searcher i+1 ... ... Send Go to 1 ... searcher i Back p1 p2 p’1 p’2 Arrive by p’1 L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-136
SLIDE 136

33/36 Intro Searching Model Results Conclusion Theorem Algo

Sketch of the distributed Algorithm

searcher j>i ... receive Go from i−1 Clear by port p1 searcher 1 send Go to 2 ... searcher k ... searcher 2 send Go to 3 receive Go from 1 ... searcher i+1 ... ... ... searcher i Back p1 p2 p’1 p’2 Arrive by p’1 L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-137
SLIDE 137

33/36 Intro Searching Model Results Conclusion Theorem Algo

Sketch of the distributed Algorithm

searcher j>i ... receive Go from i−1 Clear by port p1 searcher 1 send Go to 2 ... searcher k ... searcher 2 send Go to 3 receive Go from 1 ... searcher i+1 ... ... ... searcher i Back p1 p2 p’1 p’2 L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-138
SLIDE 138

33/36 Intro Searching Model Results Conclusion Theorem Algo

Sketch of the distributed Algorithm

searcher j>i receive Go from i Send Go to 1 searcher 1 send Go to 2 ... searcher k ... searcher 2 send Go to 3 receive Go from 1 ... searcher i+1 ... ... ... searcher i ... receive Go from i−1 Clear by port p2 Arrive by p’2 Go p1 p2 p’1 p’2 L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-139
SLIDE 139

34/36 Intro Searching Model Results Conclusion Theorem Algo

Proof of the distributed algorithm

We prove the equivalence between the algorithms. I.e, we prove both algorithms perform the same strategies in the same order It is a long case by case proof...

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-140
SLIDE 140

35/36 Intro Searching Model Results Conclusion

Plan

1

Introduction

2

Graph Searching

3

Our model

4

Our Results

5

Conclusion

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders

slide-141
SLIDE 141

36/36 Intro Searching Model Results Conclusion

Further Works

Open problems Is there exist an algorithm using finite automata ? How to reduce the size of whiteboards ? What is the amount of knowledge that is required to clear a graph in a polynomial time ?

L´ elia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial Distributed Chasing of Network Intruders