Please use this identifier to cite or link to this item: http://hdl.handle.net/20.500.12188/23191
Title: Vulnerability assessment of complex networks based on optimal flow measurements under intentional node and edge attacks
Authors: Mishkovski, Igor 
Kojchev, Risto
Trajanov, Dimitar 
Kocarev, Ljupcho
Keywords: Vulnerability, NUM, complex networks, attack strategies, measurements, bandwidth allocation
Issue Date: 28-Sep-2009
Publisher: Springer, Berlin, Heidelberg
Conference: Vulnerability, NUM, complex networks, attack strategies, measurements, bandwidth allocation
Abstract: In this paper we assess the vulnerability of different synthetic complex networks by measuring the traffic performance in presence of intentional nodes and edge attacks. We choose which nodes or edges would be attacked by using several centrality measures, such as: degree, eigenvector and betweenness centrality. In order to obtain some information about the vulnerability of the four different complex networks (random, small world, scale-free and random geometric) we analyze the throughput of these networks when the nodes or the edges are attacked using some of the above mentioned strategies. When attack happens, the bandwidth is reallocated among the flows, which affects the traffic utility. One of the obtained results shows that the scalefree network gives the best flow performance and then comes random networks, small world, and the poorest performance is given by the random geometric networks. This changes dramatically after removing some of the nodes (or edges), giving the biggest performance drop to random and scale-free networks and smallest to random geometric and small world networks.
URI: http://hdl.handle.net/20.500.12188/23191
Appears in Collections:Faculty of Computer Science and Engineering: Conference papers

Files in This Item:
File Description SizeFormat 
Vulnerability_Assessment_of_Complex_Netw.pdf165.01 kBAdobe PDFView/Open
Show full item record

Page view(s)

17
checked on Apr 19, 2024

Download(s)

4
checked on Apr 19, 2024

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.