Network Attacks Based on Vertex Coverings
نویسندگان
چکیده
The robustness of networks is an important problem that has been studied in a variety of situations, see for instance [3] or the survey [5] and the references therein. A milestone in the study of this problem was the discovery by Albert et al. of the dramatic effect of targeted attacks on networks whose vertex degrees follow a power-law distribution, like the Internet and the World Wide Web [1]. Attack strategies are often described as vertex or edge deletion strategies. We focus in this paper on vertex deletion. The vertices (also called nodes) of the network are sorted according to some property such as degree and are removed from the network according to this property. The resilience of a network to such vertex removal is important in areas ranging from vaccination strategies in epidemiology to fighting criminal organizations. In this paper we propose two vertex deletion strategies based on the structure of vertex covers of the network. Given a simple graph, e.g. a network N , a vertex cover C of N is a set of vertices such that each edge of N is incident to at least one vertex of C. We say that C is minimal if it does not contain another vertex cover. C is said to be minimum if it is of minimal cardinality among all vertex covers of N . For a given vertex v of a network N we define its covering degree, cd(v) as the number of minimal vertex covers of N that contain v. We also define the covering index of v, ci(v) as the number of minimum vertex covers of N that contain v plus the quotient of cd(v) divided by the total number of minimal vertex covers of N . We study these degrees and indices in several network models, such as Erdös-Renyi random graphs, Albert-Barabasi networks and the Watts-Strogatz small world model. In our experiments we found that the covering degree of a vertex was correlated to other widely used properties like vertex degree and betweeness centrality, but surprisingly we found that the covering index was not correlated to any of the other measures, including covering degree. We used the connectivity of the network to measure the resilience of the network to attacks based on covering degree and index and found that the covering index broke the studied networks in a bigger number of smaller disconnected components than any of the other strategies studied.
منابع مشابه
HF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets
Abstract—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks. Such attacks with the occupation of system resources, have proven to be an effective method of denying network services. Botnets that launch HTTP packet flood attacks agains...
متن کاملImproving Tor security against timing and traffic analysis attacks with fair randomization
The Tor network is probably one of the most popular online anonymity systems in the world. It has been built based on the volunteer relays from all around the world. It has a strong scientific basis which is structured very well to work in low latency mode that makes it suitable for tasks such as web browsing. Despite the advantages, the low latency also makes Tor insecure against timing and tr...
متن کاملResilient Configuration of Distribution System versus False Data Injection Attacks Against State Estimation
State estimation is used in power systems to estimate grid variables based on meter measurements. Unfortunately, power grids are vulnerable to cyber-attacks. Reducing cyber-attacks against state estimation is necessary to ensure power system safe and reliable operation. False data injection (FDI) is a type of cyber-attack that tampers with measurements. This paper proposes network reconfigurati...
متن کاملPath Coverings with Prescribed Ends in Faulty Hypercubes
We discuss the existence of vertex disjoint path coverings with prescribed ends for the n-dimensional hypercube with or without deleted vertices. Depending on the type of the set of deleted vertices and desired properties of the path coverings we establish the minimal integer m such that for every n ≥ m such path coverings exist. Using some of these results, for k ≤ 4, we prove Locke’s conjectu...
متن کاملMoving dispersion method for statistical anomaly detection in intrusion detection systems
A unified method for statistical anomaly detection in intrusion detection systems is theoretically introduced. It is based on estimating a dispersion measure of numerical or symbolic data on successive moving windows in time and finding the times when a relative change of the dispersion measure is significant. Appropriate dispersion measures, relative differences, moving windows, as well as tec...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012