A note on measurement of network vulnerability under random and intentional attacks

نویسندگان

  • A. Yazdani
  • Paul Jeffrey
چکیده

In this paper we propose an alternative approach for the assessment of network vulnerability under random and intentional attacks as compared to the results obtained from the “vulnerability function”given by Criado et al. [Int. J. Comput. Math., 86 (2)(2009), pp. 209-218]. By using spectral and statistical measurements, we assess robustness as the antonym to vulnerability of complex networks and suggest a tentative ranking for vulnerability, based on the interpretation of quantified network characteristics. We conclude that vulnerability function, derived from the networks degree distribution and its variations only, is not general enough to reflect the lack of robustness due to the specific configurations in graphs with hierarchical or centralized structures. The spectral and statistical metrics, on the other hand, capture different aspects of network topology which provide a more thorough assessment of network vulnerability.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Effective measurement of network vulnerability under random and intentional attacks

The study of the security and stability of complex networks plays a central role in reducing the risk and consequences of attacks or disfunctions of any type. The concept of vulnerability helps to measure the response of complex networks subjected to attacks on vertices and edges and it allows to spot the critical component of a network in order to improve its security. We introduce an accurate...

متن کامل

Sequential Defense Against Random and Intentional Attacks in Complex Networks

Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked...

متن کامل

Interference Mitigation of Replay Attacks in GPS Receiver using of Finite Impulse Response Filter

The vulnerability of civil GPS receiver to interference may be intentional or unintentional. Among all types of interference, replay attack intended as the most dangerous intentional one. The signal structure of replay attack is almost the same with the satellite signal. The interference effects can be reduce with the design of an appropriate filter in the receiver. This paper presents two meth...

متن کامل

Exploiting the Robustness on Power-Law Networks

Many complex networks are discovered to follow the powerlaw distribution in degree sequence, ranging from the Internet, WWW to social networks. Unfortunately, there exist a great number of threats to these complex systems. In this context, it is crucial to understand the behaviors of power-law networks under various threats. Although power-law networks have been found robust under random failur...

متن کامل

Robustness of Controllability for Networks Based on Edge-Attack

We study the controllability of networks in the process of cascading failures under two different attacking strategies, random and intentional attack, respectively. For the highest-load edge attack, it is found that the controllability of Erdős-Rényi network, that with moderate average degree, is less robust, whereas the Scale-free network with moderate power-law exponent shows strong robustnes...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1006.2791  شماره 

صفحات  -

تاریخ انتشار 2010