Need for a Realistic Measure of Attack Severity in Centrality Based Node Attack Strategies

被引:0
|
作者
John, Jisha Mariyam [1 ]
Lekha, Divya Sindhu [1 ]
机构
[1] Indian Inst Informat Technol Kottayam, Kottayam, Kerala, India
关键词
Complex networks; Vulnerability; Targeted attacks; Robustness; Network functioning; Attack efficiency; Efficiency measures; NETWORK; BETWEENNESS; EFFICIENCY; INTERNET; ERROR;
D O I
10.1007/978-3-030-93409-5_70
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Complex networks are robust to random failures; but not always to targeted attacks. The resilience of complex networks towards different node targeted attacks are studied immensely in the literature. Many node attack strategies were also proposed, and their efficiency was compared. However, in each of these proposals, the scientists used different measures of efficiency. So, it doesn't seem easy to compare them and choose the one most suitable for the system under examination. Here, we review the main results from the literature on centrality based node attack strategies. Our focus is only on the works on undirected and unweighted networks. We want to highlight the necessity of a more realistic measure of attack efficiency.
引用
收藏
页码:857 / 866
页数:10
相关论文
共 50 条
  • [31] AutoCVSS: An Approach for Automatic Assessment of Vulnerability Severity Based on Attack Process
    Zou, Deqing
    Yang, Ju
    Li, Zhen
    Jin, Hai
    Ma, Xiaojing
    GREEN, PERVASIVE, AND CLOUD COMPUTING, GPC 2019, 2019, 11484 : 238 - 253
  • [32] Modeling and Simulation of Cascading Failure on R&D Network Based on Different Node States Under Attack Strategies
    Song, Yue
    Yang, Naiding
    Zhang, Yanlu
    Wang, Jingbei
    2017 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM), 2017, : 1286 - 1290
  • [33] Lymph Node Attack during radical Prostatectomy Comment Adjuvant Hormone Therapy: further Need for Clarification
    Froehner, Michael
    Koch, Rainer
    Wirth, Manfred
    AKTUELLE UROLOGIE, 2015, 46 (01) : 12 - 13
  • [34] A bloom filter and matrix-based protocol for detecting node replication attack
    Xie, Weimin
    Wang, Liejun
    Wang, Mingwei
    Journal of Networks, 2014, 9 (06) : 1471 - 1476
  • [35] A Residual Error Analysis based Secure CS Approach for Malicious Node Attack
    Cao, Yangqin
    Yan, Jun
    Zhu, Wei-ping
    2016 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (CITS), 2016, : 151 - 155
  • [36] An algorithm of tracking and controlling network attack node based on adaptive neural networks
    Wang W.
    International Journal of Circuits, Systems and Signal Processing, 2020, 14 : 669 - 678
  • [37] Behavioural and Node Performance based Grayhole attack Detection and Amputation in AODV protocol
    Jain, Shrishti
    Raghuwanshi, Sandeep K.
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN ENGINEERING AND TECHNOLOGY RESEARCH (ICAETR), 2014,
  • [38] Dynamical robustness of networks based on betweenness against multi-node attack
    袁紫薇
    吕长春
    司书宾
    段东立
    Chinese Physics B, 2021, 30 (05) : 62 - 68
  • [39] Dynamical robustness of networks based on betweenness against multi-node attack
    Yuan, Zi-Wei
    Lv, Chang-Chun
    Si, Shu-Bin
    Duan, Dong-Li
    CHINESE PHYSICS B, 2021, 30 (05)
  • [40] Node Injection Attack Based on Label Propagation Against Graph Neural Network
    Zhu, Peican
    Pan, Zechen
    Tang, Keke
    Cui, Xiaodong
    Wang, Jinhuan
    Xuan, Qi
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2024, : 1 - 13