首页> 外文会议>Workshop on Bio-Inspired Design of Networks >Dynamic Topologies for Robust Scale-Free Networks
【24h】

Dynamic Topologies for Robust Scale-Free Networks

机译:无稳压网络的动态拓扑

获取原文

摘要

In recent years, the field of anonymity and traffic analysis have attracted much research interest. However, the analysis of subsequent dynamics of attack and defense, between an adversary using such topology information gleaned from traffic analysis to mount an attack, and defenders in a network, has recieved very little attention. Often an attacker tries to disconnect a network by destroying nodes or edges, while the defender counters using various resilience mechanisms. Examples include a music industry body attempting to close down a peer-to-peer file-sharing network; medics attempting to halt the spread of an infectious disease by selective vaccination; and a police agency trying to decapitate a terrorist organisation. Albert, Jeong and Barabasi famously analysed the static case, and showed that vertex-order attacks are effective against scale-free networks. We extend this work to the dynamic case by developing a framework to explore the interaction of attack and defence strategies. We show, first, that naive defences don't work against vertex-order attack; second, that defences based on simple redundancy don't work much better, but that defences based on cliques work well; third, that attacks based on centrality work better against clique defences than vertex-order attacks do; and fourth, that defences based on complex strategies such as delegation plus clique resist centrality attacks better than simple clique defences. Our models thus build a bridge between network analysis and traffic analysis, and provide a framework for analysing defence and attack in networks where topology matters. They suggest definitions of efficiency of attack and defence, and may even explain the evolution of insurgent organisations from networks of cells to a more virtual leadership that facilitates operations rather than directing them. Finally, we draw some conclusions and present possible directions for future research.
机译:近年来,匿名和交通分析领域吸引了许多研究兴趣。然而,分析了随后的攻击和防御动态的动态,在对手之间使用这种拓扑信息从交通分析中收集到安装攻击,以及网络中的防守者,已经收到很少的关注。通常,攻击者试图通过销毁节点或边缘来断开网络,而使用各种弹性机制的防御者计数器。示例包括尝试关闭点对点文件共享网络的音乐行业正文;试图通过选择性疫苗接种来停止传染病的传播;和警察局试图剥夺恐怖组织。 Albert,Jeong和Barabasi着名分析了静态案例,并显示出顶点攻击对无规模网络有效。通过制定框架来探索攻击和防御策略的互动来将这项工作扩展到动态案件。首先,我们展示了这个天真的防御,不适用于顶点级攻击;其次,基于简单冗余的防御性不得不更好地工作,但基于派系的防御很好地工作;第三,基于中心地的攻击更好地反对集团防御,而不是顶点秩序攻击;第四,基于代表团等复杂策略的防御,包括集团抵抗集团攻击的中心攻击比简单的集团防御更好。因此,我们的模型在网络分析和流量分析之间构建了一个桥梁,并提供了一个分析防御和拓扑攻击的框架,用于拓扑事项的网络。他们建议攻击效率的定义,甚至可以解释叛乱组织从细胞网络到更有虚拟领导的侵犯组织的演变,便于运营而不是指导它们。最后,我们得出一些结论,并提供了未来研究的可能指示。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号