The topology of covert conflict
نویسنده
چکیده
Often an attacker tries to disconnect a network by destroying nodes or edges, while the defender counters using various resilience mechanisms. Examples include a music industry body attempting to close down a peer-to-peer file-sharing network; medics attempting to halt the spread of an infectious disease by selective vaccination; and a police agency trying to decapitate a terrorist organisation. Albert, Jeong and Barabási famously analysed the static case, and showed that vertex -order attacks are effective against scale-free networks. We extend this work to the dynamic case by developing a framework based on evolutionary game theory to explore the interaction of attack and defence strategies. We show, first, that naive defences don’t work against vertex-order attack; second, that defences based on simple redundancy don’t work much better, but that defences based on cliques work well; third, that attacks based on centrality work better against clique defences than vertex-order attacks do; and fourth, that defences based on complex strategies such as delegation plus clique resist centrality attacks better than simple clique defences. Our models thus build a bridge between network analysis and evolutionary game theory, and provide a framework for analysing defence and attack in networks where topology matters. They suggest definitions of efficiency of attack and defence, and may even explain the evolution of insurgent organisations from networks of cells to a more virtual leadership that facilitates operations rather than directing them. Finally, we draw some conclusions and present possible directions for future research.
منابع مشابه
Maltreatment of boys and the development of disruptive and delinquent behavior.
Data from a longitudinal, inner-city community sample were used to examine the prevalence of child maltreatment in males and to relate this to disruptive and delinquent child behavior. By age 18 years, almost one fourth of the families had been referred to Children and Youth Services (CYS). Investigation by the CYS resulted in substantiated maltreatment of 10% of the participants, mostly for ph...
متن کاملThe Effect of motivational covert and overt self-talk on basketball free throw skill learning in adults
The purpose of this study was to evaluate the effect of motivational covert and overt self-talk on basketball free throw skill learning in adults. 60 students of Gorgan Islamic Azad University based on pretest scores randomly assigned in three equal groups (n1=n2=n3=20). Participants in motivational covert and overt self-talk conducted basketball shooting skill acquisition in 12 sessions (each ...
متن کاملCOVERT Based Algorithms for Solving the Generalized Tardiness Flow Shop Problems
Four heuristic algorithms are developed for solving the generalized version of tardiness flow shop problems. We consider the generalized tardiness flow shop model with minimization of the total tardiness as its performance measure. We modify the concept of cost over time (COVERT) for the generalized version of the flow shop tardiness model and employ this concept for developing four algorithms....
متن کاملCovert pied-piping in English multiple wh-questions
In this paper we argue for the existence of covert pied-piping in wh-questions through a previously unnoticed pattern of intervention effects in superiorityobeying English multiple wh-questions. We show that the preference of covert pied-piping is for movement of larger constituents, unlike overt pied-piping. We argue that this discrepancy stems from conflicting requirements of PF and LF: overt...
متن کاملCovert Channel in HTTP User-Agents
A subliminal covert channel establishes a nearly undetectable communication session within a pre-established data stream between two separate entities.This document explains how HTTP can be utilized to facilitate a covert channel over both local and wide area networks. The Hypertext Transfer Protocol (HTTP) accounts for a majority of the Internet’s daily web traffic and is permitted within almo...
متن کامل