Sequential defense against random and intentional attacks in complex networks

被引:18
|
作者
Chen, Pin-Yu [1 ]
Cheng, Shin-Ming [2 ]
机构
[1] Univ Michigan, Dept Elect Engn & Comp Sci, Ann Arbor, MI 48109 USA
[2] Natl Taiwan Univ Sci & Technol, Dept Comp Sci & Informat Engn, Taipei 10607, Taiwan
关键词
INTERNET; RESILIENCE; TOLERANCE;
D O I
10.1103/PhysRevE.91.022805
中图分类号
O35 [流体力学]; O53 [等离子体物理学];
学科分类号
070204 ; 080103 ; 080704 ;
摘要
Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is first proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and validate its effectiveness and reliability via canonical complex network models and real-world large-scale network topology. The results show that the sequential defense mechanism greatly improves the network robustness and mitigates the possibility of network disruption by acquiring limited attack status information from a small subset of nodes in the network.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Robustness of random networks with selective reinforcement against attacks
    Kawasumi, Tomoyo
    Hasegawa, Takehisa
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2024, 649
  • [22] TCPL: A Defense against wormhole attacks in wireless sensor networks
    Kumar, K. E. Naresh
    Waheed, Mohd. Abdul
    Basappa, K. Kari
    INTERNATIONAL CONFERENCE ON MODELING, OPTIMIZATION, AND COMPUTING, 2010, 1298 : 633 - +
  • [23] Packet leashes: A defense against wormhole attacks in wireless networks
    Hu, YC
    Perrig, A
    Johnson, DB
    IEEE INFOCOM 2003: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, 2003, : 1976 - 1986
  • [24] Importance of protections against intentional attacks
    Levitin, Gregory
    Ben-Haim, Hanoch
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2008, 93 (04) : 639 - 646
  • [25] Defense Against Objective Function Attacks in Cognitive Radio Networks
    Pei Qingqi
    Li Hongning
    Ma Jianfeng
    Fan Kefeng
    CHINESE JOURNAL OF ELECTRONICS, 2011, 20 (01): : 138 - 142
  • [26] Defense against PUEA and SSDF Attacks in Cognitive Radio Networks
    Chaitanya, D. L.
    Chari, K. Manjunatha
    PROCEEDINGS OF 2016 ONLINE INTERNATIONAL CONFERENCE ON GREEN ENGINEERING AND TECHNOLOGIES (IC-GET), 2016,
  • [27] Building Damage-Resilient Dominating Sets in Complex Networks against Random and Targeted Attacks
    F. Molnár
    N. Derzsy
    B. K. Szymanski
    G. Korniss
    Scientific Reports, 5
  • [28] Fast Defense System Against Attacks in Software Defined Networks
    De Assis, Marcos V. O.
    Novaes, Matheus P.
    Zerbini, Cinara B.
    Carvalho, Luiz F.
    Abrao, Taufik
    Proenca, Mario L., Jr.
    IEEE ACCESS, 2018, 6 : 69620 - 69639
  • [29] Building Damage-Resilient Dominating Sets in Complex Networks against Random and Targeted Attacks
    Molnar, F., Jr.
    Derzsy, N.
    Szymanski, B. K.
    Korniss, G.
    SCIENTIFIC REPORTS, 2015, 5 : 8321
  • [30] Degree-based attacks and defense strategies in complex networks
    Yehezkel, Aviv
    Cohen, Reuven
    PHYSICAL REVIEW E, 2012, 86 (06)