Tolerance of intentional attacks in complex communication networks

Motivated by recent developments in the theory of complex networks, we examine the tolerance of communication networks for intentional attacks that aim to crash the network by taking down network hubs. In addition to providing a brief survey of key existing results, we investigate two different effects that largely have been ignored in past studies. Many communication networks, such as the Internet, are too large for anyone to have global information of their topologies, which makes accurate, intentional attacks virtually impossible; most attacks in communication networks must propagate from nodes to adjacent nodes, utilizing local-network topology information only. We show that incomplete global information has a different impact on intentional attacks in different circumstances, and local information-based attacks can actually be highly efficient. Such insights will be helpful for the future development of efficient protection schemes against network attacks.

[1]  Albert-László Barabási,et al.  Error and attack tolerance of complex networks , 2000, Nature.

[2]  Cristopher Moore,et al.  On the bias of traceroute sampling: Or, power-law degree distributions in regular graphs , 2005, JACM.

[3]  P. Oscar Boykin,et al.  Disaster management in power-law networks: Recovery from and protection against intentional attacks , 2007 .

[4]  S. Low,et al.  The "robust yet fragile" nature of the Internet. , 2005, Proceedings of the National Academy of Sciences of the United States of America.

[5]  P. Oscar Boykin,et al.  Disaster Management in Scale-Free Networks: Recovery from and Protection Against Intentional Attacks , 2005, ArXiv.

[6]  S. Havlin,et al.  Breakdown of the internet under intentional attack. , 2000, Physical review letters.

[7]  R. Linsker,et al.  Improving network robustness by edge modification , 2005 .

[8]  Ying-Cheng Lai,et al.  Attack vulnerability of scale-free networks due to cascading breakdown. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[9]  Stefan Bornholdt,et al.  Handbook of Graphs and Networks: From the Genome to the Internet , 2003 .

[10]  Shi Xiao,et al.  Robustness of Complex Communication Networks under Rewiring Operations , 2006, 2006 10th IEEE Singapore International Conference on Communication Systems.

[11]  Cristopher Moore,et al.  On the bias of traceroute sampling: or, power-law degree distributions in regular graphs , 2005, STOC '05.

[12]  Michalis Faloutsos,et al.  On power-law relationships of the Internet topology , 1999, SIGCOMM '99.