Decapitation of networks with and without weights and direction : The economics of iterated attack and defense Advisor : Professor Frank Y. S. Lin Presented.

Slides:



Advertisements
Similar presentations
A First Step Towards Characterizing Stealthy Botnets Justin Leonard, Shouhuai Xu, Ravi Sandhu University of Texas at San Antonio.
Advertisements

Analysis and Modeling of Social Networks Foudalis Ilias.
School of Information University of Michigan Network resilience Lecture 20.
The Impact of Imperfect Information on Network Attack Andrew Melchionna (University of Rochester) Jesús Caloca (Boise State University) Advisors: S. Squires,
Research Direction Introduction Advisor : Frank, Y.S. Lin Presented by Yu Pu Wu.
A Set of Measures of Centrality Based on Betweenness Linton C. Freeman, 1977 Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen Presentation.
Directional triadic closure and edge deletion mechanism induce asymmetry in directed edge properties.
Networks. Graphs (undirected, unweighted) has a set of vertices V has a set of undirected, unweighted edges E graph G = (V, E), where.
1/14 Ad Hoc Networking, Eli M. Gafni and Dimitri P. Bertsekas Distributed Algorithm for Generating Loop-free Routes in Networks With Frequently.
Using Structure Indices for Efficient Approximation of Network Properties Matthew J. Rattigan, Marc Maier, and David Jensen University of Massachusetts.
Zhenhua Wu Advisor: H. E. StanleyBoston University Co-advisor: Lidia A. BraunsteinUniversidad Nacional de Mar del Plata Collaborators: Shlomo HavlinBar-Ilan.
Peer-to-Peer and Grid Computing Exercise Session 3 (TUD Student Use Only) ‏
Dynamic Hypercube Topology Stefan Schmid URAW 2005 Upper Rhine Algorithms Workshop University of Tübingen, Germany.
The Topology of Covert Conflict Shishir Nagaraja, Ross Anderson Cambridge University.
The structure of the Internet. How are routers connected? Why should we care? –While communication protocols will work correctly on ANY topology –….they.
Graphs and Topology Yao Zhao. Background of Graph A graph is a pair G =(V,E) –Undirected graph and directed graph –Weighted graph and unweighted graph.
Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks Yi Lu, Weichao Wang, Bharat Bhargava CERIAS and Department of Computer Sciences Purdue.
Systematic Analysis of Interactome: A New Trend in Bioinformatics KOCSEA Technical Symposium 2010 Young-Rae Cho, Ph.D. Assistant Professor Department of.
Network Measures Social Media Mining. 2 Measures and Metrics 2 Social Media Mining Network Measures Klout.
1 Topology Control of Multihop Wireless Networks Using Transmit Power Adjustment Infocom /12/20.
Escaping local optimas Accept nonimproving neighbors – Tabu search and simulated annealing Iterating with different initial solutions – Multistart local.
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
1 Meeyoung Cha, Sue Moon, Chong-Dae Park Aman Shaikh Placing Relay Nodes for Intra-Domain Path Diversity To appear in IEEE INFOCOM 2006.
Efficient Gathering of Correlated Data in Sensor Networks
Network Aware Resource Allocation in Distributed Clouds.
Charles L. Cartledge Michael L. Nelson Old Dominion University Department of Computer Science Norfolk, VA USA.
Trustworthiness Management in the Social Internet of Things
Overlay Network Physical LayerR : router Overlay Layer N R R R R R N.
Maximization of Network Survivability against Intelligent and Malicious Attacks (Cont’d) Presented by Erion Lin.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Network Survivability Against Region Failure Signal Processing, Communications and Computing (ICSPCC), 2011 IEEE International Conference on Ran Li, Xiaoliang.
Optimal resource assignment to maximize multistate network reliability for a computer network Yi-Kuei Lin, Cheng-Ta Yeh Advisor : Professor Frank Y. S.
Structural Properties of Networks: Introduction Networked Life NETS 112 Fall 2015 Prof. Michael Kearns.
Self-Similarity of Complex Networks Maksim Kitsak Advisor: H. Eugene Stanley Collaborators: Shlomo Havlin Gerald Paul Zhenhua Wu Yiping Chen Guanliang.
Analyzing the Vulnerability of Superpeer Networks Against Attack B. Mitra (Dept. of CSE, IIT Kharagpur, India), F. Peruani(ZIH, Technical University of.
Robustness of complex networks with the local protection strategy against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Wayne.
Analyzing the Vulnerability of Superpeer Networks Against Attack Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
Dynamics of Malicious Software in the Internet
Mitigation strategies on scale-free networks against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Chris Chang.
Oliver Hein, Goethe University, Frankfurt, Financial Agent-based Computational Economics (FINACE) Kommunikations-Netzwerk-Topologie und Marktverhalten.
Percolation and diffusion in network models Shai Carmi, Department of Physics, Bar-Ilan University Networks Percolation Diffusion Background picture: The.
Brief Announcement : Measuring Robustness of Superpeer Topologies Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
Scaling Properties of the Internet Graph Aditya Akella, CMU With Shuchi Chawla, Arvind Kannan and Srinivasan Seshan PODC 2003.
Mix networks with restricted routes PET 2003 Mix Networks with Restricted Routes George Danezis University of Cambridge Computer Laboratory Privacy Enhancing.
1 Finding Spread Blockers in Dynamic Networks (SNAKDD08)Habiba, Yintao Yu, Tanya Y., Berger-Wolf, Jared Saia Speaker: Hsu, Yu-wen Advisor: Dr. Koh, Jia-Ling.
Transport in weighted networks: optimal path and superhighways Collaborators: Z. Wu, Y. Chen, E. Lopez, S. Carmi, L.A. Braunstein, S. Buldyrev, H. E. Stanley.
Informatics tools in network science
Urban Traffic Simulated From A Dual Perspective Hu Mao-Bin University of Science and Technology of China Hefei, P.R. China
Research Direction Introduction
Research Direction Introduction Advisor : Frank, Y.S. Lin Presented by Yu Pu Wu.
Research Direction Introduction Advisor: Frank, Yeong-Sung Lin Presented by Hui-Yu, Chung 2011/11/22.
Network Dynamics and Simulation Science Laboratory Structural Analysis of Electrical Networks Jiangzhuo Chen Joint work with Karla Atkins, V. S. Anil Kumar,
Placing Relay Nodes for Intra-Domain Path Diversity Meeyoung Cha Sue Moon Chong-Dae Park Aman Shaikh Proc. of IEEE INFOCOM 2006 Speaker 游鎮鴻.
1 Roie Melamed, Technion AT&T Labs Araneola: A Scalable Reliable Multicast System for Dynamic Wide Area Environments Roie Melamed, Idit Keidar Technion.
Advisor: Yeong-Sung Lin Presented by I-Ju Shih 2011/11/29 1 Research Direction Introduction.
Response network emerging from simple perturbation Seung-Woo Son Complex System and Statistical Physics Lab., Dept. Physics, KAIST, Daejeon , Korea.
the project of the voluntary distributed computing ver.4.06 Ilya Kurochkin Institute for information transmission problem Russian academy of.
A Place-based Model for the Internet Topology Xiaotao Cai Victor T.-S. Shi William Perrizo NDSU {Xiaotao.cai, Victor.shi,
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
Cmpe 588- Modeling of Internet Emergence of Scale-Free Network with Chaotic Units Pulin Gong, Cees van Leeuwen by Oya Ünlü Instructor: Haluk Bingöl.
Link-Level Internet Structures
Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks Sushma Maramreddy.
Empirical analysis of Chinese airport network as a complex weighted network Methodology Section Presented by Di Li.
Structural Properties of Networks: Introduction
Network Science: A Short Introduction i3 Workshop
Enhancing Attack Robustness of Scale-free Networks by Camouflage
Department of Computer Science University of York
Noémi Gaskó, Rodica Ioana Lung, Mihai Alexandru Suciu
Algorithms for Budget-Constrained Survivable Topology Design
复杂网络可控性 研究进展 汪秉宏 2014 北京 网络科学论坛.
Presentation transcript:

Decapitation of networks with and without weights and direction : The economics of iterated attack and defense Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen Presentation date: Mar. 6,

Agenda Introduction Economic model Measurements Empirical work Discussion of results Conclusions 2

Agenda Introduction Economic model Measurements Empirical work Discussion of results Conclusions 3

Introduction Many empirically observed networks can be modeled as scale-free networks. Ex: peer-to- peer networks Scale-free networks are more robust against random attacks than targeted attacks. 4

Introduction Betweenness centrality can be an alternative to degree for attack targeting. A dynamic case : each round an attacker removes a certain number of nodes, but the defenders can recruit other nodes to replace the lost ones. The smaller the largest connected component after an attack-defense round, the more successful is the attack. 5

Introduction Two attacks were examined: Removal of high-degree nodes Path centrality attack -> Combine cliques with delegation is most effective -> Defense strategies (i) Radom replacement > less than 3 rounds (ii) Ring replacement > 3~12 rounds (iii) Clique replacement > robust 6

Introduction Contribution and plan of this paper: Extend the former research to consider weighted and directed networks and regards the economic aspects of the attack and defense strategies. 7

Introduction Reasons to consider weights and directions : Delegation strategies and the computation of node centralities may depend on the weight of the links. The distance between nodes may also be relevant to assess the impact of an attack on the LCC(Largest Connected Component). 8

Agenda Introduction Economic model Measurements Empirical work Discussion of results Conclusions 9

Economic model Attacks and their cost: kThe number of nodes destroyed in an attack C FA Fixed cost incurred to locate the target nodes CXCX Cost of destroying one node 10

Economic model Locating target nodes by measuring criticality of nodes: ◦ node degree ◦ node path centrality ◦ in the case of weighted : R(i)The reliability of a node I F ij The weight of most reliable path between i and j 11

Economic model Defenses and their cost C FD Fixed cost of starting a defense round C del (h[, q])Cost of implementing delegation for nodes with criticality δ higher than h hThreshold criticality qThe clique size in case delegation is based on cliques C cli (q) Cost of replacing each destroyed nodes by a clique consisting of q new nodes. 12

Economic model Delegation strategies and their cost (i)Before attacks start (ii)Each time new edges are added to the network due to the defense strategy of clique formation 13

Economic model (i) Before attacks start ◦ Node criticality is measured as node degree. ◦ A node i with degree δ (i) > h attempts to transfer some of its edges to its neighbors. 14

Economic model 15

Economic model (i) Before attacks start ◦ Node criticality is measured as node degree. ◦ A node i with degree δ (i) > h attempts to transfer some of its edges to its neighbors. ◦ Δ (i) set of edges delegated by node i cjcj cost of delegating the jth edge in Δ (i) 16

Economic model (ii) New edges are added due to clique formation ◦ Node criticality is measured using path centrality. ◦ A node i with path centrality δ (i) > h is replaced by a clique of size q. 17

Economic model 18

Economic model (ii) New edges are added due to clique formation ◦ Node criticality is measured using path centrality. ◦ A node i with path centrality δ (i) > h is replaced by a clique of size q. CnCn Cost of new nodes forming the clique Δ (i) set of edges delegated by node i cjcj cost of delegating the jth edge in Δ (i) 19

Economic model Defenses and their cost BDBD Maximum budget of defender D C FD Fixed cost of starting a defense round qThe clique size in case delegation is based on cliques C del (h[, q])Cost of implementing delegation for nodes with criticality δ higher than h C cli (q) Cost of replacing each destroyed nodes by a clique consisting of q new nodes. 20

Economic model The cost of clique replacement ◦ A destroyed node is replaced by clique of q nodes. 21

Economic model 22

Economic model The cost of clique replacement ◦ A destroyed node is replaced by clique of q nodes. ◦ CnCn Cost of new nodes forming the clique Δ (i) set of edges delegated by node i cjcj cost of delegating the jth edge in Δ (i) 23

Agenda Introduction Economic model Measurements Empirical work Discussion of results Conclusions 24

Measurements LCC(Largest Connected Component) ◦ The reduction in the network connectivity makes communication impossible between some pairs of nodes. ◦ For the attacker: smaller LCC means more successful APL(Average Path Length) ◦ APL increase means communication is still possible, but has become more difficult. ◦ For the attacker: longer APL means more successful 25

Agenda Introduction Economic model Measurements Empirical work Discussion of results Conclusions 26

Empirical work SFNG Matlab function which was used to synthesize undirected scale-free network. 4 synthetic networks with 400 nodes each. 1 large real network which is a snapshot of the structure of the Internet at the level of autonomous system taken on July 22, Formed by 22,963 nodes. 27

Empirical work Path centrality computation ◦ Unweighted networks ->Freeman’s betweenness centrality ◦ Weighted networks ->as path centrality the reliability measures 28

Empirical work Weighted networks Undirected Directed (in-reliability) 29 F ij The weight of most reliable path between i and j

Empirical work => Shortest path problem with nonnegative weights => P ij Set of different paths between two nodes i and j WpWp Set of edge weights in path p 30

Empirical work Consider attackers with several levels of partial knowledge on the attacked network: 100%, 80%, 60%, 40%, 20% Conduct 2 simulations(no defense, defense) with each of 4 initial network: Each simulation consisted of 30 attack rounds. 1. unweighted undirected3. weighted undirected 2. unweighted directed4. weighted directed 31

Empirical work For the larger real Internet network, conducted two additional, longer simulation.(with defense, without defense) Each simulation consisted of 1722 attack rounds. Simulation with defense: After a batch of q attack rounds, the defender was allowed to perform one defense round, which replaces the most critical node destroyed in the last q rounds by a clique of q nodes. 32

Empirical work Parameter choice for attack and defense ◦ Threshold criticality h was set in a network- dependent way: only 5% of nodes had criticality δ > h. ◦ Clique size q was oriented by experiments. q = 5. 33

Agenda Introduction Economic model Measurements Empirical work Discussion of results Conclusions 34

Discussion of results 1. Unweighted undirected network 35

Discussion of results 2. Unweighted directed network 36

Discussion of results 3. Weighted undirected network 37

Discussion of results 4. Weighted directed network 38

Discussion of results 5. 22,963-node Internet snapshot network 39

Agenda Introduction Economic model Measurements Empirical work Discussion of results Conclusions 40

Conclusions Previous work in this area deals only with un weighted undirected networks and does not clearly say how much attackers and defenders can do. Weights may represent bandwidth, trust, distance, etc. Attacks based on “node degree” or “path centrality”(taking weights into account). Defenses consider “delegation” and “node replacement”. 41

Conclusions Empirical results show that there are no significant differences in the resistance of unweighted and weighted networks. Directed networks were more connected and had more resistance than undirected networks. Regardless of the network type, when the attacker knows only a 20% fraction of the network topology,her attacks are not very harmful. Directed networks which are scale-free can successfully withstand attacks where the attacker knows as much 80% or even 100% of the network topology. 42

Thanks for your Attention ! Thanks for your Attention ! 43