More Effective Centrality-Based Attacks on Weighted Networks

被引:0
|
作者
Mburano, Balume [1 ]
Si, Weisheng [1 ]
Cao, Qing [2 ]
Zheng, Wei Xing [1 ]
机构
[1] Western Sydney Univ, Sch Comp Data & Math Sci, Sydney, NSW, Australia
[2] Univ Tennessee, Dept EECS, Knoxville, TN USA
关键词
Cyber-attacks; Centrality; Attack Effectiveness; Weighted Networks; ROBUSTNESS;
D O I
10.1109/ICC45041.2023.10279373
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Only when understanding hackers' tactics, can we thwart their attacks. With this spirit, this paper studies how hackers can effectively launch the so-called 'targeted node attacks', in which iterative attacks are staged on a network, and in each iteration the most important node is removed. In the existing attacks for weighted networks, the node importance is typically measured by the centralities related to shortest paths, and the attack effectiveness is also measured mostly by shortest-path-related metrics. However, this paper argues that flows can better reflect network functioning than shortest paths for those networks with carrying traffic as the main functionality. Thus, this paper proposes metrics based on flows for measuring the node importance and the attack effectiveness, respectively. Our node importance metrics include three flow-based centralities (flow betweenness, current-flow betweenness and current-flow closeness), which have not been proposed for use in the attacks on weighted networks yet. Our attack effectiveness metric is a new one proposed by us based on average network flow. Extensive experiments on both artificial and real-world networks show that the attack methods with our three suggested centralities are more effective than the existing attack methods when evaluated under our proposed attack effectiveness metric.
引用
收藏
页码:4366 / 4372
页数:7
相关论文
共 50 条
  • [1] Toward More Effective Centrality-Based Attacks on Network Topologies
    Zhang, Songwei
    Si, Weisheng
    Qiu, Tie
    Cao, Qing
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [2] Toward More Effective Centrality-Based Attacks on Network Topologies
    Zhang, Songwei
    Si, Weisheng
    Qiu, Tie
    Cao, Qing
    IEEE International Conference on Communications, 2020, 2020-June
  • [3] Complex networks after centrality-based attacks and defense
    Zafar, Maham
    Kifayat, Kashif
    Gul, Ammara
    Tahir, Usman
    Abu Ghazalah, Sarah
    COMPLEX & INTELLIGENT SYSTEMS, 2024, 10 (03) : 3907 - 3923
  • [4] Robustness of Mobile Ad Hoc Networks Under Centrality-Based Attacks
    Zhang, Dongsheng
    Cetinkaya, Egemen K.
    Sterbenz, James P. G.
    2013 5TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT), 2013, : 229 - 235
  • [5] Scaling of percolation transitions on Erdos-Renyi networks under centrality-based attacks
    Almeira, Nahuel
    Billoni, Orlando Vito
    Perotti, Juan Ignacio
    PHYSICAL REVIEW E, 2020, 101 (01)
  • [6] Robustness of Power Grid Topologies Against Centrality-Based Attacks
    Bhave, Anuja S.
    Crow, Mariesa L.
    Cetinkaya, Egemen K.
    2016 RESILIENCE WEEK (RWS), 2016, : 115 - 118
  • [7] A Centrality-Based Security Game for Multihop Networks
    Riehl, James R.
    Cao, Ming
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2018, 5 (04): : 1507 - 1516
  • [8] Centrality-Based Opinion Modeling on Temporal Networks
    Eeti
    Singh, Anurag, Sr.
    Cherifi, Hocine
    IEEE ACCESS, 2020, 8 (08): : 1945 - 1961
  • [9] Centrality-based epidemic control in complex social networks
    Mohammadreza Doostmohammadian
    Hamid R. Rabiee
    Usman A. Khan
    Social Network Analysis and Mining, 2020, 10
  • [10] Centrality-based epidemic control in complex social networks
    Doostmohammadian, Mohammadreza
    Rabiee, Hamid R.
    Khan, Usman A.
    SOCIAL NETWORK ANALYSIS AND MINING, 2020, 10 (01)