Sequential defense against random and intentional attacks in complex networks

被引:18
作者
Chen, Pin-Yu [1 ]
Cheng, Shin-Ming [2 ]
机构
[1] Univ Michigan, Dept Elect Engn & Comp Sci, Ann Arbor, MI 48109 USA
[2] Natl Taiwan Univ Sci & Technol, Dept Comp Sci & Informat Engn, Taipei 10607, Taiwan
关键词
INTERNET; RESILIENCE; TOLERANCE;
D O I
10.1103/PhysRevE.91.022805
中图分类号
O35 [流体力学]; O53 [等离子体物理学];
学科分类号
070204 ; 080103 ; 080704 ;
摘要
Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is first proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and validate its effectiveness and reliability via canonical complex network models and real-world large-scale network topology. The results show that the sequential defense mechanism greatly improves the network robustness and mitigates the possibility of network disruption by acquiring limited attack status information from a small subset of nodes in the network.
引用
收藏
页数:13
相关论文
共 36 条
  • [11] Breakdown of the internet under intentional attack
    Cohen, R
    Erez, K
    ben-Avraham, D
    Havlin, S
    [J]. PHYSICAL REVIEW LETTERS, 2001, 86 (16) : 3682 - 3685
  • [12] Resilience of the Internet to random breakdowns
    Cohen, R
    Erez, K
    ben-Avraham, D
    Havlin, S
    [J]. PHYSICAL REVIEW LETTERS, 2000, 85 (21) : 4626 - 4628
  • [13] Complex Networks: An Engineering View
    Cui, LiYing
    Kumara, Soundar
    Albert, Reka
    [J]. IEEE CIRCUITS AND SYSTEMS MAGAZINE, 2010, 10 (03) : 10 - 25
  • [14] Scale-free topology of e-mail networks
    Ebel, H
    Mielsch, LI
    Bornholdt, S
    [J]. PHYSICAL REVIEW E, 2002, 66 (03) : 1 - 035103
  • [15] Erdos P, 1959, Publicationes Mathematicae, V6, P290, DOI DOI 10.5486/PMD.1959.6.3-4.12
  • [16] Faloutsos M, 1999, COMP COMM R, V29, P251, DOI 10.1145/316194.316229
  • [17] SET OF MEASURES OF CENTRALITY BASED ON BETWEENNESS
    FREEMAN, LC
    [J]. SOCIOMETRY, 1977, 40 (01): : 35 - 41
  • [18] Growing well-connected graphs
    Ghosh, Arpita
    Boyd, Stephen
    [J]. PROCEEDINGS OF THE 45TH IEEE CONFERENCE ON DECISION AND CONTROL, VOLS 1-14, 2006, : 6605 - 6611
  • [19] Towards Unbiased BFS Sampling
    Kurant, Maciej
    Markopoulou, Athina
    Thiran, Patrick
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2011, 29 (09) : 1799 - 1809
  • [20] Lewis T.G., 2008, Network Science: Theory and Practice