Journal ArticleDOI
Characterising the robustness of complex networks
TLDR
In this article, the authors investigate the characteristics of network topologies that maintain a high level of throughput in spite of multiple attacks such as removal of random nodes, high degree nodes, and high betweenness nodes.Abstract:
With increasingly ambitious initiatives such as GENI and FIND that seek to design future internets, it becomes imperative to define the characteristics of robust topologies, and build future networks optimised for robustness. This paper investigates the characteristics of network topologies that maintain a high level of throughput in spite of multiple attacks. To this end, we select network topologies belonging to the main network models and some real world networks. We consider three types of attacks: removal of random nodes, high degree nodes, and high betweenness nodes. We use elasticity as our robustness measure and, through our analysis, illustrate different topologies that can have different degrees of robustness. In particular, elasticity can fall as low as 0.8% of the upper bound based on the attack employed. This result substantiates the need for optimised network topology design. Furthermore, we implement a trade-off function that combines elasticity under the three attack strategies and considers the cost of the network. Our extensive simulations show that, for a given network density, regular and semi-regular topologies can have higher degrees of robustness than heterogeneous topologies, and that link redundancy is a sufficient but not necessary condition for robustness.read more
Citations
More filters
Journal ArticleDOI
Mitigation of malicious attacks on networks
TL;DR: It is shown that with small changes in the network structure (low cost) the robustness of diverse networks can be improved dramatically whereas their functionality remains unchanged and is useful not only for improving significantly with low cost the robustity of existing infrastructures but also for designing economically robust network systems.
Journal ArticleDOI
Evaluation of network resilience, survivability, and disruption tolerance: analysis, topology generation, simulation, and experimentation
James P. G. Sterbenz,Egemen K. Çetinkaya,Mahmood A. Hameed,Abdul Jabbar,Shi Qian,Justin P. Rohrer +5 more
TL;DR: A comprehensive methodology to evaluate network resilience using a combination of topology generation, analytical, simulation, and experimental emulation techniques with the goal of improving the resilience and survivability of the Future Internet.
Journal ArticleDOI
Modelling communication network challenges for Future Internet resilience, survivability, and disruption tolerance: a simulation-based approach
TL;DR: A framework to evaluate network dependability and performability in the face of challenges is presented and it is shown that the impact of network challenges depends on the duration, the number of network elements in a challenged area, and the importance of the nodes in a challenge area.
Journal ArticleDOI
Optimizing algebraic connectivity by edge rewiring
TL;DR: This paper answers the question, ''Which edge can the authors rewire to have the largest increase in algebraic connectivity?'', and extends the rewiring of a single edge to rewired multiple edges to realize the maximal increase ingebraic connectivity.
Journal ArticleDOI
Path diversification for future internet end-to-end resilience and survivability
TL;DR: Based on the analysis of flow reliability across a range of networks, the path diversity metric is extended to create a composite compensated total graph diversity metric that is representative of a particular topology’s survivability with respect to distributed simultaneous link and node failures.
References
More filters
Journal ArticleDOI
Error and attack tolerance of complex networks
TL;DR: It is found that scale-free networks, which include the World-Wide Web, the Internet, social networks and cells, display an unexpected degree of robustness, the ability of their nodes to communicate being unaffected even by unrealistically high failure rates.
Book
Computer Security
TL;DR: This new edition of this self-study guide includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection.
Journal ArticleDOI
Eigen values and expanders
Noga Alon,Noga Alon +1 more
TL;DR: It is shown that a regular bipartite graph is an expanderif and only if the second largest eigenvalue of its adjacency matrix is well separated from the first.
Proceedings ArticleDOI
Epidemic spreading in real networks: an eigenvalue viewpoint
TL;DR: A general epidemic threshold condition that applies to arbitrary graphs is proposed and it is proved that, under reasonable approximations, the epidemic threshold for a network is closely related to the largest eigenvalue of its adjacency matrix.