NTU GICE Intentional Attacks on Complex Network Speaker: Shin-Ming Cheng Advisor: Kwang-Cheng Chen.

Slides:



Advertisements
Similar presentations
Routing Complexity of Faulty Networks Omer Angel Itai Benjamini Eran Ofek Udi Wieder The Weizmann Institute of Science.
Advertisements

Correctness of Gossip-Based Membership under Message Loss Maxim GurevichIdit Keidar Technion.
Marzieh Parandehgheibi
Ningning HuCarnegie Mellon University1 Optimizing Network Performance In Replicated Hosting Peter Steenkiste (CMU) with Ningning Hu (CMU), Oliver Spatscheck.
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
Achille’s Heel. An Achilles's heel is a term for a person's weak spot and is based upon the hero who was dipped in the river that granted immortality;
School of Information University of Michigan Network resilience Lecture 20.
VL Netzwerke, WS 2007/08 Edda Klipp 1 Max Planck Institute Molecular Genetics Humboldt University Berlin Theoretical Biophysics Networks in Metabolism.
The Impact of Imperfect Information on Network Attack Andrew Melchionna (University of Rochester) Jesús Caloca (Boise State University) Advisors: S. Squires,
Daniel ben -AvrahamClarkson University Boston Universtiy Reuven Cohen Tomer Kalisky Alex Rozenfeld Bar-Ilan University Eugene Stanley Lidia Braunstein.
Generated Waypoint Efficiency: The efficiency considered here is defined as follows: As can be seen from the graph, for the obstruction radius values (200,
Internet Topology Caterina Scoglio KSU. Why need for Internet Topology models To evaluate performance of algorithms and protocols Realistic models at.
Cascading failures in interdependent networks and financial systems -- Departmental Seminar Xuqing Huang Advisor: Prof. H. Eugene Stanley Collaborators:
Network theory and its applications in economic systems -- Final Oral Exam Xuqing Huang Advisor: Prof. H. Eugene Stanley Collaborators: Prof. Shlomo Havlin.
Scale Free Networks Robin Coope April Abert-László Barabási, Linked (Perseus, Cambridge, 2002). Réka Albert and AL Barabási,Statistical Mechanics.
1 Epidemic Spreading in Real Networks: an Eigenvalue Viewpoint Yang Wang Deepayan Chakrabarti Chenxi Wang Christos Faloutsos.
Zhenhua Wu Advisor: H. E. StanleyBoston University Co-advisor: Lidia A. BraunsteinUniversidad Nacional de Mar del Plata Collaborators: Shlomo HavlinBar-Ilan.
Peer-to-Peer and Grid Computing Exercise Session 3 (TUD Student Use Only) ‏
Complex Networks Structure and Dynamics Ying-Cheng Lai Department of Mathematics and Statistics Department of Electrical Engineering Arizona State University.
Novel Self-Configurable Positioning Technique for Multihop Wireless Networks Authors : Hongyi Wu Chong Wang Nian-Feng Tzeng IEEE/ACM TRANSACTIONS ON NETWORKING,
Correctness of Gossip-Based Membership under Message Loss Maxim Gurevich, Idit Keidar Technion.
(Social) Networks Analysis III Prof. Dr. Daning Hu Department of Informatics University of Zurich Oct 16th, 2012.
1 Reading Report 4 Yin Chen 26 Feb 2004 Reference: Peer-to-Peer Architecture Case Study: Gnutella Network, Matei Ruoeanu, In Int. Conf. on Peer-to-Peer.
Traceroute-like exploration of unknown networks: a statistical analysis A. Barrat, LPT, Université Paris-Sud, France I. Alvarez-Hamelin (LPT, France) L.
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
1 IEEE Trans. on Smart Grid, 3(1), pp , Optimal Power Allocation Under Communication Network Externalities --M.G. Kallitsis, G. Michailidis.
CAFE router: A Fast Connectivity Aware Multiple Nets Routing Algorithm for Routing Grid with Obstacles Y. Kohira and A. Takahashi School of Computer Science.
March 8, 2006  Yvo Desmedt Robust Operations Research II: Production Networks by Yvo Desmedt University College London, UK.
Traffic Dynamics on Networks Tao Zhou Department of Modern Physics, University of Science and Technology of China Department of Physics, University of.
Complex network geometry and navigation Dmitri Krioukov CAIDA/UCSD F. Papadopoulos, M. Kitsak, kc claffy, A. Vahdat M. Á. Serrano, M. Boguñá UCSD, December.
ANALYZING PROTEIN NETWORK ROBUSTNESS USING GRAPH SPECTRUM Jingchun Chen The Ohio State University, Columbus, Ohio Institute.
1 11 Subcarrier Allocation and Bit Loading Algorithms for OFDMA-Based Wireless Networks Gautam Kulkarni, Sachin Adlakha, Mani Srivastava UCLA IEEE Transactions.
Separability and Topology Control of Quasi Unit Disk Graphs Philippe Giabbanelli CMPT 880 – Spring 2008.
Clustering of protein networks: Graph theory and terminology Scale-free architecture Modularity Robustness Reading: Barabasi and Oltvai 2004, Milo et al.
ACN: RED paper1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking, Vol.1, No. 4, (Aug.
Network Survivability Against Region Failure Signal Processing, Communications and Computing (ICSPCC), 2011 IEEE International Conference on Ran Li, Xiaoliang.
Random-Graph Theory The Erdos-Renyi model. G={P,E}, PNP 1,P 2,...,P N E In mathematical terms a network is represented by a graph. A graph is a pair of.
Self-Similarity of Complex Networks Maksim Kitsak Advisor: H. Eugene Stanley Collaborators: Shlomo Havlin Gerald Paul Zhenhua Wu Yiping Chen Guanliang.
Emergence of Scaling and Assortative Mixing by Altruism Li Ping The Hong Kong PolyU
Optimization of Wavelength Assignment for QoS Multicast in WDM Networks Xiao-Hua Jia, Ding-Zhu Du, Xiao-Dong Hu, Man-Kei Lee, and Jun Gu, IEEE TRANSACTIONS.
School of Information University of Michigan Unless otherwise noted, the content of this course material is licensed under a Creative Commons Attribution.
Robustness of complex networks with the local protection strategy against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Wayne.
Complex network of the brain II Hubs and Rich clubs in the brain
Downlink Scheduling With Economic Considerations to Future Wireless Networks Bader Al-Manthari, Nidal Nasser, and Hossam Hassanein IEEE Transactions on.
Efficient Labeling Scheme for Scale-Free Networks The scheme in detailsPerformance of the scheme First we fix the number of hubs (to O(log(N))) and show.
Analyzing the Vulnerability of Superpeer Networks Against Attack Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
Mitigation strategies on scale-free networks against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Chris Chang.
Percolation and diffusion in network models Shai Carmi, Department of Physics, Bar-Ilan University Networks Percolation Diffusion Background picture: The.
Spontaneous Formation of Dynamical Groups in an Adaptive Networked System Li Menghui, Guan Shuguang, Lai Choy-Heng Temasek Laboratories National University.
1 EL736 Communications Networks II: Design and Algorithms Class7: Location and Topological Design Yong Liu 10/24/2007.
Network resilience.
Brief Announcement : Measuring Robustness of Superpeer Topologies Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
An Effective Method to Improve the Resistance to Frangibility in Scale-free Networks Kaihua Xu HuaZhong Normal University.
Class 10: Robustness Cascades
Informatics tools in network science
Urban Traffic Simulated From A Dual Perspective Hu Mao-Bin University of Science and Technology of China Hefei, P.R. China
Class 21: Robustness Cascades PartII
Network Dynamics and Simulation Science Laboratory Structural Analysis of Electrical Networks Jiangzhuo Chen Joint work with Karla Atkins, V. S. Anil Kumar,
Placing Relay Nodes for Intra-Domain Path Diversity Meeyoung Cha Sue Moon Chong-Dae Park Aman Shaikh Proc. of IEEE INFOCOM 2006 Speaker 游鎮鴻.
Netlogo demo. Complexity and Networks Melanie Mitchell Portland State University and Santa Fe Institute.
Cascading failures of loads in interconnected networks under intentional attack Yongxiang Xia Department of Information Science and Electronic Engineering.
Complex network of the brain II Attack tolerance vs. Lethality Jaeseung Jeong, Ph.D. Department of Bio and Brain Engineering, KAIST.
Complex network of the brain II Hubs and Rich clubs in the brain Jaeseung Jeong, Ph.D. Department of Bio and Brain Engineering, KAIST.
On the two aspects of configuration random graphs’ robustness Institute of Applied Mathematical Research Karelian Research Centre RAS (Petrozavodsk, Russia)
Cohesive Subgraph Computation over Large Graphs
Link-Level Internet Structures
Hiroki Sayama NECSI Summer School 2008 Week 2: Complex Systems Modeling and Networks Network Models Hiroki Sayama
IMSWT2012 Conference Ship Fire-fighting System Cascading Failure Analysis Based on Complex Network Theory Speaker: Hongzhang Jin Affiliation: Harbin.
Data and Computer Communications
复杂网络可控性 研究进展 汪秉宏 2014 北京 网络科学论坛.
Presentation transcript:

NTU GICE Intentional Attacks on Complex Network Speaker: Shin-Ming Cheng Advisor: Kwang-Cheng Chen

NTU GICE Outline  Introduction  Intentional attack -Cascade-based attack -Analytical model -Numerical result  Attack with global information  Attack with local information  Conclusion  Reference 2

NTU GICE Introduction  Intentional attack -Is an attack that aim at bringing down network nodes in decreasing order of nodal degrees  Whether the fragility indeed exists in Internet? -Doyle and his colleagues [1] argued that, as a result of careful design for maximizing network throughput, the hub nodes at the router level are typically the edge nodes with a large number of low-capacity connections. -The removal of these hub nodes, though disastrous to the large number of low- capacity users connected to them, will not bring down the Internet  Is the retrieval of global information in Internet possible? -Internet is too large for anyone to obtain their global topology information, which means an accurate, intentional attack is hardly feasible. -Distributed attack by using local information 3

NTU GICE Traditional Intentional attack  Cascading Failures on Power Transmission Grid Systems -Each node deals with a load of power -Removal of nodes can cause redistribution of loads over all network -A cascade of overloading failure is triggered. -On August 10, 1996, a 1300-mw electrical line in southern Oregon sagged in the summer heat resulting in break-up into four islands, with loss of 30,390 MW of load affecting 7.49 million customers in western North America [2] -On August 14, 2003, an initial disturbance in Ohio triggered the largest blackout in the U.S.’s history in which millions of people remained without electricity for as long as 15 hours  Cascading Failures on Internet -Traffic is rerouted to bypass malfunctioning routers -Eventually leading to an avalanche of overloads on other routers that are not equipped to handle extra traffic. 4

NTU GICE Input Parameters and Output Measure  The load at node i is defined as the total number of shortest paths passing through this node.  The capacity of a node is the maximum load that the node can handle.  The capacity C i of node i is proportional to its initial load L i - -where the constant is the tolerance parameter.  The removal of nodes in general changes the distribution of shortest paths.  Cascading failures can be conveniently quantified by the relative size of the largest connected component - -where N and N’ are the numbers of nodes in the largest component before and after the cascade, respectively. 5

NTU GICE Before the attack  Degree distribution:  Load distribution: -where k is the degree variable, and a and b are positive constants.  Thus, we have -where k max is the largest degree in the network and S is the total load of the network.  Then we have, and, where 6

NTU GICE After the attack  Degree distribution:  Load distribution:  Since only a small fraction of nodes are removed from the network, we assume that and  Then, and  For the node with k links, the difference in load before and after the attack can be written as  The maximum load increase that the nodes can handle is  Thus, the nodes still function if 7

NTU GICE  The critical value of the tolerance parameter  When (i.e., infinite scale-free network), -, which indicates that the network cannot be brought down by a single attack if  For a finite size network -, thus, suggesting that breakdown can occur for 8

NTU GICE Numerical Results Cascading failure in scale-free networks  In the case of the removal of the node with the highest degree,  This phase transition phenomenon seems to be robust for different sizes of network 9

NTU GICE Numerical Results Cascading failure in scale-free networks  Removal of a single node chosen -at random (squares), or among those with largest degrees (asterisks), or highest loads (circles) 10

NTU GICE Numerical Results Cascading failure in homogeneous networks  All nodes are set to have the same degree k=3 and N=5000  In the inset, k≥2, γ=3, and N=5000. The resulting average degree [k] ≈3.1 11

NTU GICE Numerical Results Robustness of the scale-free network  Internet hubs are of very high degrees. -The nodal degree of the biggest hub is 1458, whereas in the BA model, it is only (a) Barabási-Albert (BA) model (b) real-world Internet model by the NLANR Project

NTU GICE Numerical Results Robustness of the scale-free network  Greedy sequential attack: -chooses the largest-degree, live node adjacent to the node crashed in the last step as its next-step target.  Coordinated attack: -Searches through all the live nodes adjacent to any crashed node and selects among them the largest-degree node as its next-step target. 13

NTU GICE Conclusion  The scale-free network has “robust yet fragile” property, whereas the random graph is robust to both random and intentional attacks. -Internet is vulnerable to intentional attack. -However, a random attack does not significantly affect the network performance.  Performance of attacks based on incomplete/inaccurate network- topology information and local information -Incomplete information can degrade the efficiency of an intentional attack significantly, especially if a big hub is missed. -Distributed attacks can be highly effective, sometimes almost as efficient as an accurate global information-based attack.  Connection with current works? 14

NTU GICE Reference 1.J. C. Doyle et al., “The ‘Robust Yet Fragile’ Nature of the Internet,” Proc. Nat’l. Acad. Sci., vol. 102, no. 41, Oct. 2005, pp D. N. Kosterev, C. W. Taylor, and W. A. Mittelstadt, “Model validation for the August 10, 1996 WSCC system outage,” IEEE Transactions on Power Systems, vol. 14, no. 3, Aug 1999, pp A. E. Motter and Y.-C. Lai, “Cascade-based attacks on complex networks,” Phys. Rev. E, vol. 66, p (R), L. Zhao, K. Park, and Y.-C. Lai, “Attack vulnerability of scale-free networks due to cascading breakdown,” Phys. Rev. E, vol. 70, p (R), P. Crucitti, V. Latora, and M. Marchiori, “Model for cascading failures in complex networks,” Phys. Rev. E, vol. 69, p (R), Y. Xia and D. J. Hill, “Attack Vulnerability of Complex Communication Networks,” IEEE Transactions on Circuits and Systems, vol. 55, no. 1, Jan. 2008, pp S. Xiao, G. Xiao, and T. H. Cheng, “Tolerance of intentional attacks in complex communication networks,” IEEE Communication Magazine, vol. 46, no. 1, Jan 2008, pp