More Effective Centrality-Based Attacks on Weighted Networks

被引:0
|
作者
Mburano, Balume [1 ]
Si, Weisheng [1 ]
Cao, Qing [2 ]
Zheng, Wei Xing [1 ]
机构
[1] Western Sydney Univ, Sch Comp Data & Math Sci, Sydney, NSW, Australia
[2] Univ Tennessee, Dept EECS, Knoxville, TN USA
来源
ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS | 2023年
关键词
Cyber-attacks; Centrality; Attack Effectiveness; Weighted Networks; ROBUSTNESS;
D O I
10.1109/ICC45041.2023.10279373
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Only when understanding hackers' tactics, can we thwart their attacks. With this spirit, this paper studies how hackers can effectively launch the so-called 'targeted node attacks', in which iterative attacks are staged on a network, and in each iteration the most important node is removed. In the existing attacks for weighted networks, the node importance is typically measured by the centralities related to shortest paths, and the attack effectiveness is also measured mostly by shortest-path-related metrics. However, this paper argues that flows can better reflect network functioning than shortest paths for those networks with carrying traffic as the main functionality. Thus, this paper proposes metrics based on flows for measuring the node importance and the attack effectiveness, respectively. Our node importance metrics include three flow-based centralities (flow betweenness, current-flow betweenness and current-flow closeness), which have not been proposed for use in the attacks on weighted networks yet. Our attack effectiveness metric is a new one proposed by us based on average network flow. Extensive experiments on both artificial and real-world networks show that the attack methods with our three suggested centralities are more effective than the existing attack methods when evaluated under our proposed attack effectiveness metric.
引用
收藏
页码:4366 / 4372
页数:7
相关论文
共 50 条
  • [41] Measure for Centrality Based Forwarding Schemes in Opportunistic Networks
    Kim, Sun-Kyum
    Kim, Jin-Uk
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND MANAGEMENT (ICICM 2016), 2016, : 105 - 108
  • [42] Robustness of space information networks based on coverage centrality
    Zhang, Chaojie
    Li, Shuaijie
    Zhao, Chengli
    Xia, Chengyi
    PHYSICS LETTERS A, 2024, 516
  • [43] What makes you more central? Antecedents of changes in betweenness-centrality in technology-based alliance networks
    Gilsing, Victor A.
    Cloodt, Myriam
    Bertrand-Cloodt, Danielle
    TECHNOLOGICAL FORECASTING AND SOCIAL CHANGE, 2016, 111 : 209 - 221
  • [44] THE BOW-TIE CENTRALITY: A NOVEL MEASURE FOR DIRECTED AND WEIGHTED NETWORKS WITH AN INTRINSIC NODE PROPERTY
    Glattfelder, James B.
    ADVANCES IN COMPLEX SYSTEMS, 2019, 22 (06):
  • [45] Identification of Critical Links within Complex Road Networks using Centrality Principles on Weighted Graphs
    Bidikar, Nirupam
    Zhang, Yunpeng
    Qiao, Fengxiang
    PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGIES (ICSOFT), 2021, : 542 - 549
  • [46] New Betweenness Centrality Node Attack Strategies for Real-World Complex Weighted Networks
    Quang Nguyen
    Ngoc-Kim-Khanh Nguyen
    Cassi, Davide
    Bellingeri, Michele
    COMPLEXITY, 2021, 2021
  • [47] The MSS of Complex Networks with Centrality Based Preference and Its Application to Biomolecular Networks
    Wu, Lin
    Tang, Lingkai
    Li, Min
    Wang, Jianxin
    Wu, Fang-Xiang
    2016 IEEE INTERNATIONAL CONFERENCE ON BIOINFORMATICS AND BIOMEDICINE (BIBM), 2016, : 229 - 234
  • [48] Centrality measure in social networks based on linear threshold model
    Riquelme, Fabian
    Gonzalez-Cantergiani, Pablo
    Molinero, Xavier
    Serna, Maria
    KNOWLEDGE-BASED SYSTEMS, 2018, 140 : 92 - 102
  • [49] Fitness consequences of centrality in mutualistic individual-based networks
    Gomez, Jose M.
    Perfectti, Francisco
    PROCEEDINGS OF THE ROYAL SOCIETY B-BIOLOGICAL SCIENCES, 2012, 279 (1734) : 1754 - 1760
  • [50] CSR: A Centrality Based on Robustness and Controllable Subspace of Complex Networks
    Mahmood, A.
    Usman, Umair
    Wang, Lin
    PROCEEDINGS OF THE 2019 31ST CHINESE CONTROL AND DECISION CONFERENCE (CCDC 2019), 2019, : 1280 - 1285