Need for a Realistic Measure of Attack Severity in Centrality Based Node Attack Strategies

被引:0
|
作者
John, Jisha Mariyam [1 ]
Lekha, Divya Sindhu [1 ]
机构
[1] Indian Inst Informat Technol Kottayam, Kottayam, Kerala, India
关键词
Complex networks; Vulnerability; Targeted attacks; Robustness; Network functioning; Attack efficiency; Efficiency measures; NETWORK; BETWEENNESS; EFFICIENCY; INTERNET; ERROR;
D O I
10.1007/978-3-030-93409-5_70
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Complex networks are robust to random failures; but not always to targeted attacks. The resilience of complex networks towards different node targeted attacks are studied immensely in the literature. Many node attack strategies were also proposed, and their efficiency was compared. However, in each of these proposals, the scientists used different measures of efficiency. So, it doesn't seem easy to compare them and choose the one most suitable for the system under examination. Here, we review the main results from the literature on centrality based node attack strategies. Our focus is only on the works on undirected and unweighted networks. We want to highlight the necessity of a more realistic measure of attack efficiency.
引用
收藏
页码:857 / 866
页数:10
相关论文
共 50 条
  • [41] FEINT AND ATTACK: ATTENTION-BASED STRATEGIES FOR JAILBREAKING AND PROTECTING LLMS
    Pu, Rui
    Li, Chaozhuo
    Ha, Rui
    Chen, Zejian
    Zhang, Litian
    Liu, Zheng
    Qiu, Lirong
    Zhang, Xi
    arXiv,
  • [42] Node ID based detection of Sybil attack in mobile wireless sensor network
    Sharmila, S.
    Umamaheswari, G.
    INTERNATIONAL JOURNAL OF ELECTRONICS, 2013, 100 (10) : 1441 - 1454
  • [43] Sequential Node Attack of Complex Networks based on Q-learning Method
    Ma, Weijun
    Fang, Junyuan
    Wu, Jiajing
    2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,
  • [44] HNOP: Attack Traffic Detection Based on Hierarchical Node Hopping Features of Packets
    Geng, Jinbu
    Cheng, Zhenyu
    Liu, Zhicheng
    Li, Shuhao
    Qin, Rui
    COMPUTATIONAL SCIENCE - ICCS 2022, PT I, 2022, : 431 - 444
  • [45] Study on Power Grid Partition and Attack Strategies Based on Complex Networks
    Zou, Yanli
    Li, Haoqian
    FRONTIERS IN PHYSICS, 2022, 9
  • [46] Attack Strategies and Countermeasures in Transport-Based Time Synchronization Solutions
    Berbecaru, Diana Gratiela
    Lioy, Antonio
    INTELLIGENT DISTRIBUTED COMPUTING XIV, 2022, 1026 : 203 - 213
  • [47] Uncertainty-Aware Diffusion-Based Adversarial Attack for Realistic Colonoscopy Image Synthesis
    Jeong, Minjae
    Cho, Hyuna
    Jung, Sungyoon
    Kim, Won Hwa
    MEDICAL IMAGE COMPUTING AND COMPUTER ASSISTED INTERVENTION - MICCAI 2024, PT IX, 2024, 15009 : 647 - 658
  • [48] A Reliable Approach for Generating Realistic Adversarial Attack via Trust Region-Based Optimization
    Dhamija, Lovi
    Bansal, Urvashi
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2024, 49 (09) : 13203 - 13220
  • [49] An Accurate Tax Fraud Classifier with Feature Selection based on Complex Network Node Centrality Measure
    Matos, Tales
    de Macedo, Jose Antonio F.
    Monteiro, Jose Maria
    Lettich, Francesco
    ICEIS: PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS - VOL 1, 2017, : 145 - 151
  • [50] A parameterised model for link prediction using node centrality and similarity measure based on graph embedding
    Lu, Haohui
    Uddin, Shahadat
    NEUROCOMPUTING, 2024, 593