The cost of attack in competing networks

被引:40
|
作者
Podobnik, B. [1 ,2 ,3 ,4 ]
Horvatic, D. [5 ]
Lipic, T. [1 ,2 ,6 ]
Perc, M. [7 ,8 ]
Buldu, J. M. [9 ,10 ]
Stanley, H. E. [1 ,2 ]
机构
[1] Boston Univ, Ctr Polymer Studies, Boston, MA 02215 USA
[2] Boston Univ, Dept Phys, Boston, MA 02215 USA
[3] Univ Rijeka, Fac Civil Engn, Rijeka 51000, Croatia
[4] Zagreb Sch Econ & Management, Zagreb 10000, Croatia
[5] Univ Zagreb, Fac Nat Sci, Zagreb 10000, Croatia
[6] Rudjer Boskovic Inst, Ctr Informat & Comp, Zagreb 10000, Croatia
[7] Univ Maribor, Fac Nat Sci & Math, SLO-2000 Maribor, Slovenia
[8] King Abdulaziz Univ, Fac Sci, Dept Phys, Jeddah, Saudi Arabia
[9] Ctr Biomed Technol UPM, Madrid 28223, Spain
[10] Rey Juan Carlos Univ, Complex Syst Grp, Madrid 28933, Spain
基金
美国国家科学基金会;
关键词
complex networks; interactive networks; socioeconomic systems; network vulnerability; robustness; attacks; SELF-ORGANIZED CRITICALITY; COMPLEX; ARCHITECTURE; RESILIENCE; CASCADE;
D O I
10.1098/rsif.2015.0770
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Real-world attacks can be interpreted as the result of competitive interactions between networks, ranging from predator-prey networks to networks of countries under economic sanctions. Although the purpose of an attack is to damage a target network, it also curtails the ability of the attacker, which must choose the duration and magnitude of an attack to avoid negative impacts on its own functioning. Nevertheless, despite the large number of studies on interconnected networks, the consequences of initiating an attack have never been studied. Here, we address this issue by introducing a model of network competition where a resilient network is willing to partially weaken its own resilience in order to more severely damage a less resilient competitor. The attacking network can take over the competitor's nodes after their long inactivity. However, owing to a feedback mechanism the takeovers weaken the resilience of the attacking network. We define a conservation law that relates the feedback mechanism to the resilience dynamics for two competing networks. Within this formalism, we determine the cost and optimal duration of an attack, allowing a network to evaluate the risk of initiating hostilities.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Robustness of Complex Networks Considering Attack Cost
    Wang, Chengwang
    Xia, Yongxiang
    [J]. IEEE ACCESS, 2020, 8 : 172398 - 172404
  • [2] Attack-Aware Optical Networks Planning: A Cost Analysis
    Furdek, Marija
    Jirattigalachote, Amornrat
    Skorin-Kapov, Nina
    Wosinska, Lena
    [J]. 2011 13TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS (ICTON), 2011,
  • [3] Cascades Tolerance of Scale-Free Networks with Attack Cost
    Hong, Chen
    Yin, Nai-Yu
    He, Ning
    Lordan, Oriol
    Maria Sallan, Jose
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2017, 10 (01) : 1330 - 1336
  • [4] Cascades Tolerance of Scale-Free Networks with Attack Cost
    Chen Hong
    Nai-Yu Yin
    Ning He
    Oriol Lordan
    Jose Maria Sallan
    [J]. International Journal of Computational Intelligence Systems, 2017, 10 : 1330 - 1336
  • [5] Detection of Trojaning Attack on Neural Networks via Cost of Sample Classification
    Gao, Hui
    Chen, Yunfang
    Zhang, Wei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [6] Misinformation Detection and Adversarial Attack Cost Analysis in Directional Social Networks
    Shao, Huajie
    Yao, Shuochao
    Jing, Andong
    Liu, Shengzhong
    Liu, Dongxin
    Wang, Tianshi
    Li, Jinyang
    Yang, Chaoqi
    Wang, Ruijie
    Abdelzaher, Tarek
    [J]. 2020 29TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2020), 2020,
  • [7] Robustness of complex networks under cost-constrained cascaded attack strategies
    Ding, Lin
    Xie, Lunxiao
    Wen, Juan
    Tan, Minsheng
    [J]. MODERN PHYSICS LETTERS B, 2024, 38 (19):
  • [8] Robustness of complex networks under cost-constrained cascaded attack strategies
    Ding, Lin
    Xie, Lunxiao
    Wen, Juan
    Tan, Minsheng
    [J]. MODERN PHYSICS LETTERS B, 2024, 38 (19):
  • [9] Attack vulnerability of peer-to-peer networks and cost-effective immunization
    Huang, XL
    Ma, FY
    Li, Y
    [J]. PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS - ISPA 2005 WORKSHOPS, 2005, 3759 : 45 - 53
  • [10] A low-cost node capture attack algorithm for wireless sensor networks
    Lin, Chi
    Wu, Guowei
    Qiu, Tie
    Deng, Jing
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (07) : 1251 - 1268