More Effective Centrality-Based Attacks on Weighted Networks

被引:0
|
作者
Mburano, Balume [1 ]
Si, Weisheng [1 ]
Cao, Qing [2 ]
Zheng, Wei Xing [1 ]
机构
[1] Western Sydney Univ, Sch Comp Data & Math Sci, Sydney, NSW, Australia
[2] Univ Tennessee, Dept EECS, Knoxville, TN USA
关键词
Cyber-attacks; Centrality; Attack Effectiveness; Weighted Networks; ROBUSTNESS;
D O I
10.1109/ICC45041.2023.10279373
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Only when understanding hackers' tactics, can we thwart their attacks. With this spirit, this paper studies how hackers can effectively launch the so-called 'targeted node attacks', in which iterative attacks are staged on a network, and in each iteration the most important node is removed. In the existing attacks for weighted networks, the node importance is typically measured by the centralities related to shortest paths, and the attack effectiveness is also measured mostly by shortest-path-related metrics. However, this paper argues that flows can better reflect network functioning than shortest paths for those networks with carrying traffic as the main functionality. Thus, this paper proposes metrics based on flows for measuring the node importance and the attack effectiveness, respectively. Our node importance metrics include three flow-based centralities (flow betweenness, current-flow betweenness and current-flow closeness), which have not been proposed for use in the attacks on weighted networks yet. Our attack effectiveness metric is a new one proposed by us based on average network flow. Extensive experiments on both artificial and real-world networks show that the attack methods with our three suggested centralities are more effective than the existing attack methods when evaluated under our proposed attack effectiveness metric.
引用
收藏
页码:4366 / 4372
页数:7
相关论文
共 50 条
  • [21] Centrality-Based Capital Allocations
    Alter, Adrian
    Craig, Ben R.
    Raupach, Peter
    INTERNATIONAL JOURNAL OF CENTRAL BANKING, 2015, 11 (03): : 329 - 377
  • [22] Centrality-based and similarity-based neighborhood extension in graph neural networks
    Zohrabi, Mohammadjavad
    Saravani, Saeed
    Chehreghani, Mostafa Haghir
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (16): : 24638 - 24663
  • [23] Modeling Infection Transmission in Primate Networks to Predict Centrality-Based Risk
    Romano, Valeria
    Duboscq, Julie
    Sarabian, Cecile
    Thomas, Elodie
    Sueur, Cedric
    Macintosh, Andrew J. J.
    AMERICAN JOURNAL OF PRIMATOLOGY, 2016, 78 (07) : 767 - 779
  • [24] A Centrality-based RSU Deployment Approach for Vehicular Ad Hoc Networks
    Wang, Zhenyu
    Zheng, Jun
    Wu, Yuying
    Mitton, Nathalie
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [25] CenLP: A centrality-based label propagation algorithm for community detection in networks
    Sun, Heli
    Liu, Jiao
    Huang, Jianbin
    Wang, Guangtao
    Yang, Zhou
    Song, Qinbao
    Jia, Xiaolin
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2015, 436 : 767 - 780
  • [26] Betweenness Centrality-Based seismic risk management for bridge transportation networks
    Chen, Mengdie
    Mangalathu, Sujith
    Jeon, Jong-Su
    ENGINEERING STRUCTURES, 2023, 289
  • [27] Anti-triangle centrality-based community detection in complex networks
    Jia, Songwei
    Gao, Lin
    Gao, Yong
    Wang, Haiyang
    IET SYSTEMS BIOLOGY, 2014, 8 (03) : 116 - 125
  • [28] Centrality-Based Approach for Identifying Essential Cancer Proteins in PPI Networks
    Trilochan Rout
    Anjali Mohapatra
    Madhabananda Kar
    Dillip Kumar Muduly
    SN Computer Science, 6 (1)
  • [29] Centrality-Based Improvements to CDCL Heuristics
    Jamali, Sima
    Mitchell, David
    THEORY AND APPLICATIONS OF SATISFIABILITY TESTING - SAT 2018, 2018, 10929 : 122 - 131
  • [30] Centrality-based Data Dissemination Protocol for Vehicular Ad hoc Networks
    Costa, Joahannes
    Lobato Junior, Wellington
    de Souza, Allan M.
    Rosario, Denis
    Villas, Leandro A.
    Cerqueira, Eduardo
    2017 IEEE 16TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2017, : 61 - 64