Need for a Realistic Measure of Attack Severity in Centrality Based Node Attack Strategies

被引:0
|
作者
John, Jisha Mariyam [1 ]
Lekha, Divya Sindhu [1 ]
机构
[1] Indian Inst Informat Technol Kottayam, Kottayam, Kerala, India
关键词
Complex networks; Vulnerability; Targeted attacks; Robustness; Network functioning; Attack efficiency; Efficiency measures; NETWORK; BETWEENNESS; EFFICIENCY; INTERNET; ERROR;
D O I
10.1007/978-3-030-93409-5_70
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Complex networks are robust to random failures; but not always to targeted attacks. The resilience of complex networks towards different node targeted attacks are studied immensely in the literature. Many node attack strategies were also proposed, and their efficiency was compared. However, in each of these proposals, the scientists used different measures of efficiency. So, it doesn't seem easy to compare them and choose the one most suitable for the system under examination. Here, we review the main results from the literature on centrality based node attack strategies. Our focus is only on the works on undirected and unweighted networks. We want to highlight the necessity of a more realistic measure of attack efficiency.
引用
收藏
页码:857 / 866
页数:10
相关论文
共 50 条
  • [1] New Betweenness Centrality Node Attack Strategies for Real-World Complex Weighted Networks
    Quang Nguyen
    Ngoc-Kim-Khanh Nguyen
    Cassi, Davide
    Bellingeri, Michele
    COMPLEXITY, 2021, 2021
  • [2] A Realistic Attack on SVD Based Watermarking Scheme
    Naderahmadian, Yashar
    Beheshti, Soosan
    2015 IEEE 28TH CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2015, : 1238 - 1242
  • [3] Combat network effectiveness evaluation under different node attack strategies based on operation loop
    Yang W.
    Wang Y.
    Yang Y.
    Tang L.
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2021, 43 (11): : 3220 - 3228
  • [4] Cascading Failures in Power Grid under Three Node Attack Strategies
    Jia, Sui-Min
    Wang, Yun-Ye
    Feng, Cong
    Jia, Zhi-Juan
    Hu, Ming-Sheng
    INTELLIGENT COMPUTING METHODOLOGIES, 2014, 8589 : 779 - 786
  • [5] Robustness of network attack strategies against node sampling and link errors
    Otsuka, Momoko
    Tsugawa, Sho
    PLOS ONE, 2019, 14 (09):
  • [6] Integrated Defense Mechanism Based on Attack Goals against Three Attack Strategies in Smart Grid
    Kang, WenJie
    Zhu, PeiDong
    Liu, XuChong
    IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2020, : 1027 - 1032
  • [7] A Flow-Based Node Dominance Centrality Measure for Complex Networks
    Mandyam Kannappan S.
    Sridhar U.
    SN Computer Science, 3 (5)
  • [8] Eigenvector Centrality Measure Based on Node Similarity for Multilayer and Temporal Networks
    Lv, Laishui
    Zhang, Kun
    Zhang, Ting
    Li, Xun
    Zhang, Jiahui
    Xue, Wei
    IEEE ACCESS, 2019, 7 (115725-115733) : 115725 - 115733
  • [9] Game based DDoS Attack Strategies in Cloud of Things
    Wang, Yichuan
    Zhang, Yefei
    Zhang, Liumei
    Zhu, Lei
    Liu, Yanxiao
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING FOR MECHANICS AND MATERIALS, 2016, 97 : 759 - 762
  • [10] An Approach Toward the Optimization of Witness Based Node Clone Attack
    Mishra, Balmukund
    Singh, Yashwant
    2015 THIRD INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP), 2015, : 506 - 510