Sequential defense against random and intentional attacks in complex networks

被引:18
|
作者
Chen, Pin-Yu [1 ]
Cheng, Shin-Ming [2 ]
机构
[1] Univ Michigan, Dept Elect Engn & Comp Sci, Ann Arbor, MI 48109 USA
[2] Natl Taiwan Univ Sci & Technol, Dept Comp Sci & Informat Engn, Taipei 10607, Taiwan
关键词
INTERNET; RESILIENCE; TOLERANCE;
D O I
10.1103/PhysRevE.91.022805
中图分类号
O35 [流体力学]; O53 [等离子体物理学];
学科分类号
070204 ; 080103 ; 080704 ;
摘要
Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is first proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and validate its effectiveness and reliability via canonical complex network models and real-world large-scale network topology. The results show that the sequential defense mechanism greatly improves the network robustness and mitigates the possibility of network disruption by acquiring limited attack status information from a small subset of nodes in the network.
引用
收藏
页数:13
相关论文
共 50 条
  • [31] Complex networks after centrality-based attacks and defense
    Zafar, Maham
    Kifayat, Kashif
    Gul, Ammara
    Tahir, Usman
    Abu Ghazalah, Sarah
    COMPLEX & INTELLIGENT SYSTEMS, 2024, 10 (03) : 3907 - 3923
  • [32] Defense Mechanisms against Data Injection Attacks in Smart Grid Networks
    Jiang, Jing
    Qian, Yi
    IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (10) : 76 - 82
  • [33] Encoding Generative Adversarial Networks for Defense Against Image Classification Attacks
    Perez-Bravo, Jose M.
    Rodriguez-Rodriguez, Jose A.
    Garcia-Gonzalez, Jorge
    Molina-Cabello, Miguel A.
    Thurnhofer-Hemsi, Karl
    Lopez-Rubio, Ezequiel
    BIO-INSPIRED SYSTEMS AND APPLICATIONS: FROM ROBOTICS TO AMBIENT INTELLIGENCE, PT II, 2022, 13259 : 163 - 172
  • [34] Defense against injecting traffic attacks in cooperative ad hoc networks
    Yu, W
    Liu, KJR
    GLOBECOM '05: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6: DISCOVERY PAST AND FUTURE, 2005, : 1737 - 1741
  • [35] Defense against primary user emulation attacks in cognitive radio networks
    Chen, Ruiliang
    Park, Jung-Min
    Reed, Jeffrey H.
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2008, 26 (01) : 25 - 37
  • [36] Defense mechanism using overlay against DDoS attacks on converged networks
    Kim, Mihui
    Doh, Inshil
    Chae, Kijoon
    9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 1539 - +
  • [37] A defense against clock skew replication attacks in wireless sensor networks
    Huang, Ding-Jie
    Teng, Wei-Chung
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 39 : 26 - 37
  • [38] CAPnet: A Defense Against Cache Accounting Attacks on Content Distribution Networks
    Almashaqbeh, Ghada
    Kelley, Kevin
    Bishop, Allison
    Cappos, Justin
    2019 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2019, : 250 - 258
  • [39] Defense against Routing Disruption Attacks in Mobile Ad Hoc Networks
    Chen, Ruiliang
    Snow, Michael
    Park, Jung-Min
    Refaei, M. Tamer
    Eltoweissy, Mohamed
    GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [40] A collaborative defense mechanism against SYN flooding attacks in IP networks
    Safa, Haidar
    Chouman, Mohamad
    Artail, Hassan
    Karam, Marcel
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2008, 31 (04) : 509 - 534