More Effective Centrality-Based Attacks on Weighted Networks

被引:0
|
作者
Mburano, Balume [1 ]
Si, Weisheng [1 ]
Cao, Qing [2 ]
Zheng, Wei Xing [1 ]
机构
[1] Western Sydney Univ, Sch Comp Data & Math Sci, Sydney, NSW, Australia
[2] Univ Tennessee, Dept EECS, Knoxville, TN USA
来源
ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS | 2023年
关键词
Cyber-attacks; Centrality; Attack Effectiveness; Weighted Networks; ROBUSTNESS;
D O I
10.1109/ICC45041.2023.10279373
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Only when understanding hackers' tactics, can we thwart their attacks. With this spirit, this paper studies how hackers can effectively launch the so-called 'targeted node attacks', in which iterative attacks are staged on a network, and in each iteration the most important node is removed. In the existing attacks for weighted networks, the node importance is typically measured by the centralities related to shortest paths, and the attack effectiveness is also measured mostly by shortest-path-related metrics. However, this paper argues that flows can better reflect network functioning than shortest paths for those networks with carrying traffic as the main functionality. Thus, this paper proposes metrics based on flows for measuring the node importance and the attack effectiveness, respectively. Our node importance metrics include three flow-based centralities (flow betweenness, current-flow betweenness and current-flow closeness), which have not been proposed for use in the attacks on weighted networks yet. Our attack effectiveness metric is a new one proposed by us based on average network flow. Extensive experiments on both artificial and real-world networks show that the attack methods with our three suggested centralities are more effective than the existing attack methods when evaluated under our proposed attack effectiveness metric.
引用
收藏
页码:4366 / 4372
页数:7
相关论文
共 50 条
  • [31] h-Type hybrid centrality measures for weighted networks
    Abbasi, Alireza
    SCIENTOMETRICS, 2013, 96 (02) : 633 - 640
  • [32] h-Type hybrid centrality measures for weighted networks
    Alireza Abbasi
    Scientometrics, 2013, 96 : 633 - 640
  • [33] A study on centrality measures in weighted networks: A case of the aviation network
    Zhao, Shuying
    Sun, Shaowei
    AIMS MATHEMATICS, 2024, 9 (02): : 3630 - 3645
  • [34] Centrality-based pathway enrichment: a systematic approach for finding significant pathways dominated by key genes
    Gu, Zuguang
    Liu, Jialin
    Cao, Kunming
    Zhang, Junfeng
    Wang, Jin
    BMC SYSTEMS BIOLOGY, 2012, 6
  • [35] Node centrality in weighted networks: Generalizing degree and shortest paths
    Opsahl, Tore
    Agneessens, Filip
    Skvoretz, John
    SOCIAL NETWORKS, 2010, 32 (03) : 245 - 251
  • [36] Effective Forwarding Scheme for Opportunistic Networks Based on Refined Contact Probability and Betweenness Centrality
    Kim, Sun-Kyum
    Yang, Sung-Bong
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (01) : 217 - 232
  • [37] Fast Incremental Computation of Harmonic Closeness Centrality in Directed Weighted Networks
    Putman, K.
    Boekhout, Hanjo D.
    Takes, Frank W.
    PROCEEDINGS OF THE 2019 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2019), 2019, : 1018 - 1025
  • [38] Weighted brain networks in disease: centrality and entropy in human immunodeficiency virus and aging
    Thomas, Jewell B.
    Brier, Matthew R.
    Ortega, Mario
    Benzinger, Tammie L.
    Ances, Beau M.
    NEUROBIOLOGY OF AGING, 2015, 36 (01) : 401 - 412
  • [39] Routing Strategy based on Centrality in Opportunistic Networks
    Raghav, Nidhi
    Kumar, Anoop
    PROCEEDINGS OF THE 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2019, : 922 - 926
  • [40] EFFECT OF CLIENT DEMANDS ON DESTRUCTIVENESS OF TARGETED ATTACKS IN DIRECTED WEIGHTED SCALE-FREE NETWORKS
    Ma, Li-Li
    Jiang, Xin
    Zhang, Zhan-Li
    Zheng, Zhi-Ming
    MODERN PHYSICS LETTERS B, 2011, 25 (19): : 1603 - 1617