More Effective Centrality-Based Attacks on Weighted Networks

被引:0
|
作者
Mburano, Balume [1 ]
Si, Weisheng [1 ]
Cao, Qing [2 ]
Zheng, Wei Xing [1 ]
机构
[1] Western Sydney Univ, Sch Comp Data & Math Sci, Sydney, NSW, Australia
[2] Univ Tennessee, Dept EECS, Knoxville, TN USA
来源
ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS | 2023年
关键词
Cyber-attacks; Centrality; Attack Effectiveness; Weighted Networks; ROBUSTNESS;
D O I
10.1109/ICC45041.2023.10279373
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Only when understanding hackers' tactics, can we thwart their attacks. With this spirit, this paper studies how hackers can effectively launch the so-called 'targeted node attacks', in which iterative attacks are staged on a network, and in each iteration the most important node is removed. In the existing attacks for weighted networks, the node importance is typically measured by the centralities related to shortest paths, and the attack effectiveness is also measured mostly by shortest-path-related metrics. However, this paper argues that flows can better reflect network functioning than shortest paths for those networks with carrying traffic as the main functionality. Thus, this paper proposes metrics based on flows for measuring the node importance and the attack effectiveness, respectively. Our node importance metrics include three flow-based centralities (flow betweenness, current-flow betweenness and current-flow closeness), which have not been proposed for use in the attacks on weighted networks yet. Our attack effectiveness metric is a new one proposed by us based on average network flow. Extensive experiments on both artificial and real-world networks show that the attack methods with our three suggested centralities are more effective than the existing attack methods when evaluated under our proposed attack effectiveness metric.
引用
收藏
页码:4366 / 4372
页数:7
相关论文
共 50 条
  • [21] A node centrality evaluation model for weighted social networks
    Li, Jing-Ru
    Yu, Li
    Zhao, Jia
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2014, 43 (03): : 322 - 328
  • [23] A Novel Entropy-Based Centrality Approach for Identifying Vital Nodes in Weighted Networks
    Qiao, Tong
    Shan, Wei
    Yu, Ganjun
    Liu, Chen
    ENTROPY, 2018, 20 (04)
  • [24] Vulnerability of link-weighted complex networks in central attacks and fallback strategy
    Divya, P. B.
    Lekha, Divya Sindhu
    Johnson, T. P.
    Balakrishnan, Kannan
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2022, 590
  • [25] Centrality-based hierarchy for street network generalization in multi-resolution maps
    Shoman, Wasim
    Gulgen, Fatih
    GEOCARTO INTERNATIONAL, 2017, 32 (12) : 1352 - 1366
  • [26] Centrality-Based Network Coding Node Selection Mechanism for Improving Network Throughput
    Kim, Tae-hwa
    Choi, Hyungwoo
    Park, Hong-Shik
    2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, : 864 - 867
  • [27] Ranking Hubs in Weighted Networks with Node Centrality and Statistics
    Zhu, Yan
    Ma, Haitao
    2015 FIFTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC), 2015, : 743 - 746
  • [28] A GPU-based solution for fast calculation of the betweenness centrality in large weighted networks
    Fan, Rui
    Xu, Ke
    Zhao, Jichang
    PEERJ COMPUTER SCIENCE, 2017,
  • [29] Pop-Routing: Centrality-based Tuning of Control Messages for Faster Route Convergence
    Maccari, Leonardo
    Lo Cigno, Renato
    IEEE INFOCOM 2016 - THE 35TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, 2016,
  • [30] Exploring the effectiveness of node attacks based on combined centrality measures in scale-free networks
    Divya, P. B.
    Johnson, T. P.
    Balakrishnan, Kannan
    Azad, N.
    JOURNAL OF COMPLEX NETWORKS, 2023, 11 (06)