Abstract
Network attack can invalidate the connectivity of the resource network topology composed of routers, switches and other resources. This type of structural vulnerability which is caused by increasing scale of nodes in the network is a hotspot of current researches. In order to integrate the random attack and the targeted attack, we proposed an asymmetric information attack model which is closer to reality. In this attack model, we use the attack range and the node detection degree to adjust the attack mode and these two parameters extend the attack mode more than the random attack and the targeted attack. In this paper, we apply our attack model to attack BA network, ER network and Router network under different parameters. Then we find the random attack is better than other attack modes with nonzero node detection degree in ER network. And BA network is fragile to nonzero node detection degree attack mode. In addition, we also notice that although the distribution of Router network and BA network both satisfy the power law distribution, they show different structural vulnerability. The random attack has a better effect than the asymmetric information attack with nonzero node detection degree and attack range. Router network has the same structural vulnerability with ER network, which means Router network also has randomness.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Burch, H., Cheswick, B.: Computer 32(4), 97 (1999)
Guo, R.R., Song, R.S.: Comput. Eng. Appl. 38(10), 162 (2002)
Trajanovski, S., MartÃn-Hernández, J., Winterbach, W., Mieghem, P.V.: J. Complex Netw. 1(1), 44–62 (2013)
Scellato, S., Leontiadis, I., Mascolo, C., Basu, P., Zafer, M.: Proceedings of INFOCOM, Shanghai, China, pp. 1–5. IEEE (2011)
Huang, X., Gao, J., Buldyrev, S.V., Havlin, S., Stanley, H.E.: Phys. Rev. E 83, 065101 (2011)
Wang, J., Jiang, C., Qian, J.: J. Netw. Comput. Appl. 40(7), 97 (2014)
Byungjoon, M., Do, Y.S., Kyu-Min, L., Goh, K.-I.: Phys. Rev. E 89(4), 042811 (2014)
Pin-Yu, C., Shin-Ming, C.: Phys. Rev. E 91(2), 19 (2015)
Xie, F., Cheng, S.Q., Chen, D.Q., Zhang, G.Q.: J. Tsinghua Univ. (Sci. Technol.) 10, 1252 (2011)
Albert, R., Jeong, H., Barabási, A., Albert, R.: Nature 406(6794), 378 (2000)
Li, R.H., Yu, J.X., Huang, X., Hong, C., Ze, C.S.: Inf. Sci. 278(10), 685 (2014)
Li, D., Zhang, Q., Zio, E., Havlin, S., Kang, R.: Reliab. Eng. Syst. Saf. 142, 556 (2015)
Ye, B., Jia, J.-J., Zuo, K.-W., Ma, X.P.: Int. J. Mod. Phys. C 26(4), 1550040 (2015)
Tanizawa, T., Paul, G., Cohen, R., Havlin, S., Stanley, H.E.: Phys. Rev. E Stat. Nonlinear Soft Matter Phys. 71(4), 047101 (2005)
Karrer, B., Newman, M.E.J., Zdeborová, L.: Phys. Rev. Lett. 113(20), 208702 (2014)
Newman, M.E.J.: Phys. Rev. E 76(4), 70 (2007)
Zhou, D., Stanley, H.E., D’Agostino, G., Scala, A.: Phys. Rev. E 86(6), 066103 (2012)
Dinh, T.N., Xuan, Y., Thai, M.T., Pardalos, P.M., Znati, T.: IEEE/ACM Trans. Networking 20(2), 609 (2011)
Ronald, S.B.: Am. J. Sociol. 110(2), 349 (2004)
Fu, L.D.: Ph.D. dissertation (Xidian University) (2012). (in Chinese)
Dueñas-Osorio, L., Craig, J.I., Goodno, B.J., Bostrom, A.: J. Infrastruct. Syst. 13(3), 185 (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
He, M., Wang, X., You, J., Wang, Z. (2018). Analysis on Structural Vulnerability Under the Asymmetric Information. In: Zu, Q., Hu, B. (eds) Human Centered Computing. HCC 2017. Lecture Notes in Computer Science(), vol 10745. Springer, Cham. https://doi.org/10.1007/978-3-319-74521-3_53
Download citation
DOI: https://doi.org/10.1007/978-3-319-74521-3_53
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-74520-6
Online ISBN: 978-3-319-74521-3
eBook Packages: Computer ScienceComputer Science (R0)