Uncertainty in vulnerability of networks under attack

被引:0
|
作者
Alireza Ermagun
Nazanin Tajik
Hani Mahmassani
机构
[1] George Mason University,Department of Geography and Geoinformation Science
[2] Mississippi State University,Department of Industrial and Systems Engineering
[3] Northwestern University,Department of Civil and Environmental Engineering
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
This study builds conceptual explanations and empirical examinations of the vulnerability response of networks under attack. Two quantities of “vulnerability” and “uncertainty in vulnerability” are defined by scrutinizing the performance loss trajectory of networks experiencing attacks. Both vulnerability and uncertainty in vulnerability quantities are a function of the network topology and size. This is tested on 16 distinct topologies appearing in infrastructure, social, and biological networks with 8 to 26 nodes under two percolation scenarios exemplifying benign and malicious attacks. The findings imply (i) crossing path, tree, and diverging tail are the most vulnerable topologies, (ii) complete and matching pairs are the least vulnerable topologies, (iii) complete grid and complete topologies show the most uncertainty for vulnerability, and (iv) hub-and-spoke and double u exhibit the least uncertainty in vulnerability. The findings also imply that both vulnerability and uncertainty in vulnerability increase with an increase in the size of the network. It is argued that in networks with no undirected cycle and one undirected cycle, the uncertainty in vulnerability is maximal earlier in the percolation process. With an increase in the number of cycles, the uncertainty in vulnerability is accumulated at the end of the percolation process. This emphasizes the role of tailoring preparedness, response, and recovery phases for networks with different topologies when they might experience disruption.
引用
收藏
相关论文
共 50 条
  • [11] Attack Vulnerability of Public Transport Networks
    von Ferber, Christian
    Holovatch, Taras
    Holovatch, Yurij
    TRAFFIC AND GRANULAR FLOW '07, 2009, : 721 - +
  • [12] Attack Vulnerability of Online Social networks
    Li, Hui
    2018 37TH CHINESE CONTROL CONFERENCE (CCC), 2018, : 1051 - 1056
  • [13] Vulnerability Analysis for Complex Networks under the Shortest Path-Attack Strategies
    Hao, Yaohui
    Han, Jihong
    Cheng, Qinghua
    Hu, Yongjin
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INFORMATION MANAGEMENT AND NETWORK SECURITY, 2016, 47 : 138 - 141
  • [14] Vulnerability analysis of interdependent spatially embedded infrastructure networks under localized attack
    Yan, Ke-Sheng
    Rong, Li-Li
    Li, Qun
    MODERN PHYSICS LETTERS B, 2017, 31 (09):
  • [15] Analyzing the Vulnerability of Superpeer Networks Against Attack
    Mitra, B.
    Peruani, F.
    Ghose, S.
    Ganguly, N.
    CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 225 - +
  • [16] Attack vulnerability of self-organizing networks
    Zhang, Jianhua
    Xu, Xiaoming
    Hong, Liu
    Wang, Shuliang
    Fei, Qi
    SAFETY SCIENCE, 2012, 50 (03) : 443 - 447
  • [17] Gaussian Estimation under Attack Uncertainty
    Javidi, Tara
    Kaspi, Yonatan
    Tyagi, Himanshu
    2015 IEEE INFORMATION THEORY WORKSHOP (ITW), 2015,
  • [18] CNNs Under Attack: On the Vulnerability of Deep Neural Networks Based Face Recognition to Image Morphing
    Wandzik, Lukasz
    Garcia, Raul Vicente
    Kaeding, Gerald
    Chen, Xi
    DIGITAL FORENSICS AND WATERMARKING, 2017, 10431 : 121 - 135
  • [19] Cascade-based attack vulnerability in complex networks
    Xie, Feng
    Cheng, Suqi
    Chen, Dongqing
    Zhang, Guoqiang
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2011, 51 (10): : 1252 - 1257
  • [20] Attack vulnerability of complex networks with different initial failure
    Liu Yunyuan
    PROCEEDINGS OF THE 35TH CHINESE CONTROL CONFERENCE 2016, 2016, : 1292 - 1295