首页> 外文会议>Bio-Inspired Computing and Commnunication >Dynamic Topologies for Robust Scale-Free Networks
【24h】

Dynamic Topologies for Robust Scale-Free Networks

机译:健壮的无标度网络的动态拓扑

获取原文
获取原文并翻译 | 示例

摘要

In recent years, the field of anonymity and traffic analysis have attracted much research interest. However, the analysis of subsequent dynamics of attack and defense, between an adversary using such topology information gleaned from traffic analysis to mount an attack, and defenders in a network, has recieved very little attention. Often an attacker tries to disconnect a network by destroying nodes or edges, while the defender counters using various resilience mechanisms. Examples include a music industry body attempting to close down a peer-to-peer file-sharing networkrn; medics attempting to halt the spread of an infectious disease by selective vaccinationrn; and a police agency trying to decapitate a terrorist organisation. Albert, Jeong and Barabasi famously analysed the static case, and showed that vertex-order attacks are effective against scale-free networks. We extend this work to the dynamic case by developing a framework to explore the interaction of attack and defence strategies. We show, first, that naive defences don't work against vertex-order attackrn; second, that defences based on simple redundancy don't work much better, but that defences based on cliques work wellrn; third, that attacks based on centrality work better against clique defences than vertex-order attacks dorn; and fourth, that defences based on complex strategies such as delegation plus clique resist centrality attacks better than simple clique defences. Our models thus build a bridge between network analysis and traffic analysis, and provide a framework for analysing defence and attack in networks where topology matters. They suggest definitions of efficiency of attack and defence, and may even explain the evolution of insurgent organisations from networks of cells to a more virtual leadership that facilitates operations rather than directing them. Finally, we draw some conclusions and present possible directions for future research.
机译:近年来,匿名和流量分析领域吸引了许多研究兴趣。但是,对于攻击者和防御者随后的动态分析(使用从流量分析中收集来发起攻击的此类拓扑信息的攻击者)与网络中的防御者之间的关注很少。通常,攻击者试图通过破坏节点或边缘来断开网络连接,而防御者则使用各种弹性机制进行反击。例如,音乐行业团体试图关闭对等文件共享网络。医务人员试图通过选择性疫苗接种来阻止传染病的传播;还有一个试图将恐怖组织斩首的警察机构。 Albert,Jeong和Barabasi对静态情况进行了著名的分析,并表明顶点顺序攻击对无标度网络有效。通过开发一个框架来探索攻击和防御策略的相互作用,我们将这项工作扩展到动态案例。首先,我们证明天真防御对顶点顺序攻击无效。第二,基于简单冗余的防御措施效果不佳,但基于集团的防御措施则运行良好。第三,基于中心性的攻击比针对顶点顺序的攻击更能抵御集团防御。第四,基于复杂策略(例如授权加集团)的防御比简单的集团防御更能抵抗集中攻击。因此,我们的模型在网络分析和流量分析之间架起了一座桥梁,并提供了一个分析拓扑重要的网络中的防御和攻击的框架。他们提出了进攻和防御效率的定义,甚至可能解释了叛乱组织从牢房网络到更虚拟的领导力的演变,这种领导力促进了行动而不是指挥行动。最后,我们得出一些结论,并提出未来研究的可能方向。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号