Skip to main content

Analysis on Structural Vulnerability Under the Asymmetric Information

  • Conference paper
  • First Online:
Human Centered Computing (HCC 2017)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10745))

Included in the following conference series:

  • 1688 Accesses

Abstract

Network attack can invalidate the connectivity of the resource network topology composed of routers, switches and other resources. This type of structural vulnerability which is caused by increasing scale of nodes in the network is a hotspot of current researches. In order to integrate the random attack and the targeted attack, we proposed an asymmetric information attack model which is closer to reality. In this attack model, we use the attack range and the node detection degree to adjust the attack mode and these two parameters extend the attack mode more than the random attack and the targeted attack. In this paper, we apply our attack model to attack BA network, ER network and Router network under different parameters. Then we find the random attack is better than other attack modes with nonzero node detection degree in ER network. And BA network is fragile to nonzero node detection degree attack mode. In addition, we also notice that although the distribution of Router network and BA network both satisfy the power law distribution, they show different structural vulnerability. The random attack has a better effect than the asymmetric information attack with nonzero node detection degree and attack range. Router network has the same structural vulnerability with ER network, which means Router network also has randomness.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Burch, H., Cheswick, B.: Computer 32(4), 97 (1999)

    Article  Google Scholar 

  2. Guo, R.R., Song, R.S.: Comput. Eng. Appl. 38(10), 162 (2002)

    Google Scholar 

  3. Trajanovski, S., Martín-Hernández, J., Winterbach, W., Mieghem, P.V.: J. Complex Netw. 1(1), 44–62 (2013)

    Article  Google Scholar 

  4. Scellato, S., Leontiadis, I., Mascolo, C., Basu, P., Zafer, M.: Proceedings of INFOCOM, Shanghai, China, pp. 1–5. IEEE (2011)

    Google Scholar 

  5. Huang, X., Gao, J., Buldyrev, S.V., Havlin, S., Stanley, H.E.: Phys. Rev. E 83, 065101 (2011)

    Article  Google Scholar 

  6. Wang, J., Jiang, C., Qian, J.: J. Netw. Comput. Appl. 40(7), 97 (2014)

    Article  Google Scholar 

  7. Byungjoon, M., Do, Y.S., Kyu-Min, L., Goh, K.-I.: Phys. Rev. E 89(4), 042811 (2014)

    Article  Google Scholar 

  8. Pin-Yu, C., Shin-Ming, C.: Phys. Rev. E 91(2), 19 (2015)

    Google Scholar 

  9. Xie, F., Cheng, S.Q., Chen, D.Q., Zhang, G.Q.: J. Tsinghua Univ. (Sci. Technol.) 10, 1252 (2011)

    Google Scholar 

  10. Albert, R., Jeong, H., Barabási, A., Albert, R.: Nature 406(6794), 378 (2000)

    Article  Google Scholar 

  11. Li, R.H., Yu, J.X., Huang, X., Hong, C., Ze, C.S.: Inf. Sci. 278(10), 685 (2014)

    Article  Google Scholar 

  12. Li, D., Zhang, Q., Zio, E., Havlin, S., Kang, R.: Reliab. Eng. Syst. Saf. 142, 556 (2015)

    Article  Google Scholar 

  13. Ye, B., Jia, J.-J., Zuo, K.-W., Ma, X.P.: Int. J. Mod. Phys. C 26(4), 1550040 (2015)

    Article  Google Scholar 

  14. Tanizawa, T., Paul, G., Cohen, R., Havlin, S., Stanley, H.E.: Phys. Rev. E Stat. Nonlinear Soft Matter Phys. 71(4), 047101 (2005)

    Article  Google Scholar 

  15. Karrer, B., Newman, M.E.J., Zdeborová, L.: Phys. Rev. Lett. 113(20), 208702 (2014)

    Article  Google Scholar 

  16. Newman, M.E.J.: Phys. Rev. E 76(4), 70 (2007)

    Article  Google Scholar 

  17. Zhou, D., Stanley, H.E., D’Agostino, G., Scala, A.: Phys. Rev. E 86(6), 066103 (2012)

    Article  Google Scholar 

  18. Dinh, T.N., Xuan, Y., Thai, M.T., Pardalos, P.M., Znati, T.: IEEE/ACM Trans. Networking 20(2), 609 (2011)

    Article  Google Scholar 

  19. Ronald, S.B.: Am. J. Sociol. 110(2), 349 (2004)

    Article  Google Scholar 

  20. Fu, L.D.: Ph.D. dissertation (Xidian University) (2012). (in Chinese)

    Google Scholar 

  21. Dueñas-Osorio, L., Craig, J.I., Goodno, B.J., Bostrom, A.: J. Infrastruct. Syst. 13(3), 185 (2007)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mingshu He .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

He, M., Wang, X., You, J., Wang, Z. (2018). Analysis on Structural Vulnerability Under the Asymmetric Information. In: Zu, Q., Hu, B. (eds) Human Centered Computing. HCC 2017. Lecture Notes in Computer Science(), vol 10745. Springer, Cham. https://doi.org/10.1007/978-3-319-74521-3_53

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-74521-3_53

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-74520-6

  • Online ISBN: 978-3-319-74521-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics