More Effective Centrality-Based Attacks on Weighted Networks

被引:0
|
作者
Mburano, Balume [1 ]
Si, Weisheng [1 ]
Cao, Qing [2 ]
Zheng, Wei Xing [1 ]
机构
[1] Western Sydney Univ, Sch Comp Data & Math Sci, Sydney, NSW, Australia
[2] Univ Tennessee, Dept EECS, Knoxville, TN USA
关键词
Cyber-attacks; Centrality; Attack Effectiveness; Weighted Networks; ROBUSTNESS;
D O I
10.1109/ICC45041.2023.10279373
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Only when understanding hackers' tactics, can we thwart their attacks. With this spirit, this paper studies how hackers can effectively launch the so-called 'targeted node attacks', in which iterative attacks are staged on a network, and in each iteration the most important node is removed. In the existing attacks for weighted networks, the node importance is typically measured by the centralities related to shortest paths, and the attack effectiveness is also measured mostly by shortest-path-related metrics. However, this paper argues that flows can better reflect network functioning than shortest paths for those networks with carrying traffic as the main functionality. Thus, this paper proposes metrics based on flows for measuring the node importance and the attack effectiveness, respectively. Our node importance metrics include three flow-based centralities (flow betweenness, current-flow betweenness and current-flow closeness), which have not been proposed for use in the attacks on weighted networks yet. Our attack effectiveness metric is a new one proposed by us based on average network flow. Extensive experiments on both artificial and real-world networks show that the attack methods with our three suggested centralities are more effective than the existing attack methods when evaluated under our proposed attack effectiveness metric.
引用
收藏
页码:4366 / 4372
页数:7
相关论文
共 50 条
  • [31] Discussion of "Centrality-Based Capital Allocations"
    Tahbaz-Salehi, Alireza
    INTERNATIONAL JOURNAL OF CENTRAL BANKING, 2015, 11 (03): : 379 - 384
  • [32] A novel centrality-based method for visual analytics of small-world networks
    Chun-Cheng Lin
    Weidong Huang
    Wan-Yu Liu
    Sheng-Feng Wu
    Journal of Visualization, 2019, 22 : 973 - 990
  • [33] Centrality-Based Group Profiling: A Comparative Study in Co-authorship Networks
    João E. A. Gomes
    Ricardo B. C. Prudêncio
    André C. A. Nascimento
    New Generation Computing, 2018, 36 : 59 - 89
  • [34] Identifying the influential nodes in complex social networks using centrality-based approach
    Ishfaq, Umar
    Khan, Hikmat Ullah
    Iqbal, Saqib
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (10) : 9376 - 9392
  • [35] MCR : A Motif Centrality-Based Distributed Message Routing for Disaster Area Networks
    Roy, Utsa
    Roy, Satyaki
    Khan, Rajshekhar
    Ghosh, Preetam
    Ghosh, Nirnay
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (24) : 25337 - 25349
  • [36] A novel centrality-based method for visual analytics of small-world networks
    Lin, Chun-Cheng
    Huang, Weidong
    Liu, Wan-Yu
    Wu, Sheng-Feng
    JOURNAL OF VISUALIZATION, 2019, 22 (05) : 973 - 990
  • [37] Centrality-Based Group Profiling: A Comparative Study in Co-authorship Networks
    Gomes, Joao E. A.
    Prudencio, Ricardo B. C.
    Nascimento, Andre C. A.
    NEW GENERATION COMPUTING, 2018, 36 (01) : 59 - 89
  • [38] Link Prediction in Complex Networks Using Average Centrality-Based Similarity Score
    Nandini, Y. V.
    Lakshmi, T. Jaya
    Enduri, Murali Krishna
    Sharma, Hemlata
    ENTROPY, 2024, 26 (06)
  • [39] A Centrality-Based ACK Forwarding Mechanism for Efficient Routing in Infrastructureless Opportunistic Networks
    Dhurandher, Sanjay K.
    Woungang, Isaac
    Rajendra, Anshu
    Ghai, Piyush
    Chatzimisios, Periklis
    INTERNET OF THINGS: IOT INFRASTRUCTURES, PT I, 2016, 169 : 99 - 108
  • [40] Centrality-Based Equal Risk Contribution Portfolio
    Patki, Shreya
    Kwon, Roy H.
    Lawryshyn, Yuri
    RISKS, 2024, 12 (01)