Network robustness versus multi-strategy sequential attack

نویسندگان

  • Mario Ventresca
  • Dionne M. Aleman
چکیده

We examine the robustness of networks under attack when the attacker sequentially selects from a number of different attack strategies, each of which removes one node from the network. Network robustness refers to the ability of a network to maintain functionality under attack, and the problem-dependent context implies a number of robustness measures exist. Thus, we analyse four measures: (1) entropy, (2) efficiency, (3) size of largest network component, and suggest to also utilize (4) pairwise connectivity. Six network centrality measures form the set of strategies at the disposal of the attacker. Our study examines the utility of greedy strategy selection versus random strategy selection for each attack, whereas previous studies focused on greedy selection but limited to only one attack strategy. Using a set of common complex network benchmarks in addition to real-world networks, we find that randomly selecting an attack strategy often performs well when the attack strategies are of high quality. We also examine defense against the attacks by adding k edges after each node attack and find that the greedy strategy is most useful in this context. We also observed that a betweenness-based attack often outperforms both random and greedy strategy selection.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Sequential Defense Against Random and Intentional Attacks in Complex Networks

Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked...

متن کامل

Attack-Aware Cooperative Spectrum Sensing in Cognitive Radio Networks under Byzantine Attack

Cooperative Spectrum Sensing (CSS) is an effective approach to overcome the impact of multi-path fading and shadowing issues. The reliability of CSS can be severely degraded under Byzantine attack, which may be caused by either malfunctioning sensing terminals or malicious nodes. Almost, the previous studies have not analyzed and considered the attack in their models. The present study introduc...

متن کامل

Resilient Configuration of Distribution System versus False Data Injection Attacks Against State Estimation

State estimation is used in power systems to estimate grid variables based on meter measurements. Unfortunately, power grids are vulnerable to cyber-attacks. Reducing cyber-attacks against state estimation is necessary to ensure power system safe and reliable operation. False data injection (FDI) is a type of cyber-attack that tampers with measurements. This paper proposes network reconfigurati...

متن کامل

Sliding Mode with Neural Network Regulator for DFIG Using Two-Level NPWM Strategy

This article presents a sliding mode control (SMC) with artificial neural network (ANN) regulator for the doubly fed induction generator (DFIG) using two-level neural pulse width modulation (NPWM) technique. The proposed control scheme of the DFIG-based wind turbine system (WTS) combines the advantages of SMC control and ANN regulator. The reaching conditions, robustness and stability of the sy...

متن کامل

The Influences of Edge Asymmetry on Network Robustness

Asymmetry of in/out-degree distribution is a widespread phenomenon in real-world complex networks. This paper put forward the concept of Edge Asymmetry(EA) to quantify this feature. We designed an EA-based strategy to attack six kinds of real-world networks and found that it was able to achieve the effect as well as edge betweenness-based(EB) and better than edge degree-based(ED) and random att...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • J. Complex Networks

دوره 3  شماره 

صفحات  -

تاریخ انتشار 2015