Uncertainty in vulnerability of networks under attack

被引:0
|
作者
Alireza Ermagun
Nazanin Tajik
Hani Mahmassani
机构
[1] George Mason University,Department of Geography and Geoinformation Science
[2] Mississippi State University,Department of Industrial and Systems Engineering
[3] Northwestern University,Department of Civil and Environmental Engineering
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
This study builds conceptual explanations and empirical examinations of the vulnerability response of networks under attack. Two quantities of “vulnerability” and “uncertainty in vulnerability” are defined by scrutinizing the performance loss trajectory of networks experiencing attacks. Both vulnerability and uncertainty in vulnerability quantities are a function of the network topology and size. This is tested on 16 distinct topologies appearing in infrastructure, social, and biological networks with 8 to 26 nodes under two percolation scenarios exemplifying benign and malicious attacks. The findings imply (i) crossing path, tree, and diverging tail are the most vulnerable topologies, (ii) complete and matching pairs are the least vulnerable topologies, (iii) complete grid and complete topologies show the most uncertainty for vulnerability, and (iv) hub-and-spoke and double u exhibit the least uncertainty in vulnerability. The findings also imply that both vulnerability and uncertainty in vulnerability increase with an increase in the size of the network. It is argued that in networks with no undirected cycle and one undirected cycle, the uncertainty in vulnerability is maximal earlier in the percolation process. With an increase in the number of cycles, the uncertainty in vulnerability is accumulated at the end of the percolation process. This emphasizes the role of tailoring preparedness, response, and recovery phases for networks with different topologies when they might experience disruption.
引用
收藏
相关论文
共 50 条
  • [1] Uncertainty in vulnerability of networks under attack
    Ermagun, Alireza
    Tajik, Nazanin
    Mahmassani, Hani
    SCIENTIFIC REPORTS, 2023, 13 (01)
  • [2] Assessing Attack Vulnerability in Networks with Uncertainty
    Dinh, Thang N.
    Thai, My T.
    2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), 2015,
  • [3] Vulnerability of complex networks under intentional attack with incomplete information
    Wu, J.
    Deng, H. Z.
    Tan, Y. J.
    Zhu, D. Z.
    JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2007, 40 (11) : 2665 - 2671
  • [4] Attack vulnerability of complex networks
    Holme, P
    Kim, BJ
    Yoon, CN
    Han, SK
    PHYSICAL REVIEW E, 2002, 65 (05)
  • [5] Attack vulnerability of complex networks
    Holme, Petter
    Kim, Beom Jun
    Yoon, Chang No
    Han, Seung Kee
    Physical Review E - Statistical, Nonlinear, and Soft Matter Physics, 2002, 65 (05): : 1 - 056109
  • [6] The Vulnerability of the Military SoS Networks under Different Attack and Defense Strategies
    Jin, Wei-Xin
    Song, Ping
    Liu, Guo-Zhu
    2014 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS (SOLI), 2014, : 65 - 72
  • [7] Vulnerability of Complex Networks under Approximate Longest Chain Attack Strategies
    Hao, Yao-Hui
    Song, Jia-Liang
    Lin, Yi
    Han, Ji-Hong
    3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS (ITA 2016), 2016, 7
  • [8] Attack vulnerability of complex communication networks
    Xia, Yongxiang
    Hill, David J.
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2008, 55 (01) : 65 - 69
  • [9] Error and attack vulnerability of temporal networks
    Trajanovski, S.
    Scellato, S.
    Leontiadis, I.
    PHYSICAL REVIEW E, 2012, 85 (06):
  • [10] Attack Vulnerability of Public Transport Networks
    von Ferber, Christian
    Holovatch, Taras
    Holovatch, Yurij
    TRAFFIC AND GRANULAR FLOW '07, 2009, : 721 - +