Uncertainty in vulnerability of networks under attack

被引:0
|
作者
Alireza Ermagun
Nazanin Tajik
Hani Mahmassani
机构
[1] George Mason University,Department of Geography and Geoinformation Science
[2] Mississippi State University,Department of Industrial and Systems Engineering
[3] Northwestern University,Department of Civil and Environmental Engineering
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
This study builds conceptual explanations and empirical examinations of the vulnerability response of networks under attack. Two quantities of “vulnerability” and “uncertainty in vulnerability” are defined by scrutinizing the performance loss trajectory of networks experiencing attacks. Both vulnerability and uncertainty in vulnerability quantities are a function of the network topology and size. This is tested on 16 distinct topologies appearing in infrastructure, social, and biological networks with 8 to 26 nodes under two percolation scenarios exemplifying benign and malicious attacks. The findings imply (i) crossing path, tree, and diverging tail are the most vulnerable topologies, (ii) complete and matching pairs are the least vulnerable topologies, (iii) complete grid and complete topologies show the most uncertainty for vulnerability, and (iv) hub-and-spoke and double u exhibit the least uncertainty in vulnerability. The findings also imply that both vulnerability and uncertainty in vulnerability increase with an increase in the size of the network. It is argued that in networks with no undirected cycle and one undirected cycle, the uncertainty in vulnerability is maximal earlier in the percolation process. With an increase in the number of cycles, the uncertainty in vulnerability is accumulated at the end of the percolation process. This emphasizes the role of tailoring preparedness, response, and recovery phases for networks with different topologies when they might experience disruption.
引用
收藏
相关论文
共 50 条
  • [41] Jamming in Wireless Networks Under Uncertainty
    Eitan Altman
    Konstantin Avrachenkov
    Andrey Garnaev
    Mobile Networks and Applications, 2011, 16 : 246 - 254
  • [42] Vulnerability of AND/OR logic networks under cascading failures
    Tao, Ye
    Liu, Nian
    Wang, Xinliang
    Tana, Shaolin
    PHYSICS LETTERS A, 2024, 525
  • [43] Oscillations in Complex Communication Networks under Attack
    Yongxiang Xia
    Circuits, Systems & Signal Processing, 2008, 27 : 799 - 809
  • [44] Oscillations in Complex Communication Networks under Attack
    Xia, Yongxiang
    CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2008, 27 (06) : 799 - 809
  • [45] Queueing analysis for networks under DoS attack
    Aissani, Amar
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2008, PT 2, PROCEEDINGS, 2008, 5073 : 500 - 513
  • [46] Robustness of Complex Networks under Attack and Repair
    Hu Bin
    Li Fang
    Zhou Hou-Shun
    CHINESE PHYSICS LETTERS, 2009, 26 (12)
  • [47] Robustness of interdependent networks under targeted attack
    Huang, Xuqing
    Gao, Jianxi
    Buldyrev, Sergey V.
    Havlin, Shlomo
    Stanley, H. Eugene
    PHYSICAL REVIEW E, 2011, 83 (06):
  • [48] Robustness of network of networks under targeted attack
    Dong, Gaogao
    Gao, Jianxi
    Du, Ruijin
    Tian, Lixin
    Stanley, H. Eugene
    Havlin, Shlomo
    PHYSICAL REVIEW E, 2013, 87 (05)
  • [49] Attack Vulnerability of Power Systems Under an Equal Load Redistribution Model
    Gulcu, Talha Cihad
    Chatziafratis, Vaggos
    Zhang, Yingrui
    Yagan, Osman
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2018, 26 (03) : 1306 - 1319
  • [50] Vulnerability analysis of interdependent infrastructure systems under edge attack strategies
    Wang, Shuliang
    Hong, Liu
    Ouyang, Min
    Zhang, Jianhua
    Chen, Xueguang
    SAFETY SCIENCE, 2013, 51 (01) : 328 - 337