Community Cut-off Attack on Malicious Networks

This paper aims to provide an efficient algorithm for quick disabling of known malicious network by sequential removal or incapacitation of their nodes. The nodes are selected for deletion in such a sequence, that the network is swiftly separated into small disjoined parts. We propose using a community detection based on random walks. For all the divisions of the found communities into two separate sets we create bigraphs defined by the edge set with each edge’s node in different community and use Koenig’s theorem to find the best vertex cut (set of vertices to be deleted). This community detection and their separation is used recursively on a currently maximal component of the network. The effectiveness of our algorithm is tested on both real-world and model networks by quantifying network robustness measure R based on the size of maximum component. Its results compare favorably against standard centrality based attack strategies.

[1]  Miltiadis Chalikias,et al.  Maximising Accuracy and Efficiency of Traffic Accident Prediction Combining Information Mining with Computational Intelligence Approaches and Decision Trees , 2014, J. Artif. Intell. Soft Comput. Res..

[2]  T. Killingback,et al.  Attack Robustness and Centrality of Complex Networks , 2013, PloS one.

[3]  Harry Eugene Stanley,et al.  Robustness of interdependent networks under targeted attack , 2010, Physical review. E, Statistical, nonlinear, and soft matter physics.

[4]  P. Duijn,et al.  Social Network Analysis Applied to Criminal Networks: Recent Developments in Dutch Law Enforcement , 2014 .

[5]  M E J Newman,et al.  Finding and evaluating community structure in networks. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.

[6]  Ulrik Brandes,et al.  On Modularity Clustering , 2008, IEEE Transactions on Knowledge and Data Engineering.

[7]  James R. Lee,et al.  Improved Approximation Algorithms for Minimum Weight Vertex Separators , 2008, SIAM J. Comput..

[8]  M. Newman,et al.  Finding community structure in very large networks. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[9]  Alessandro Vespignani,et al.  Immunization of complex networks. , 2001, Physical review. E, Statistical, nonlinear, and soft matter physics.

[10]  Tatiana Tambouratzis,et al.  Combining probabilistic neural networks and decision trees for maximally accurate and efficient accident prediction , 2010, The 2010 International Joint Conference on Neural Networks (IJCNN).

[11]  Ladislav Huraj,et al.  IPv6 Network DDoS Attack with P2P Grid , 2015 .

[12]  M. Cernanský,et al.  Performance Evaluations of IPTables Firewall Solutions under DDoS attacks , 2015 .

[13]  Mark Newman,et al.  Networks: An Introduction , 2010 .

[14]  Reuven Cohen,et al.  Efficient immunization strategies for computer networks and populations. , 2002, Physical review letters.

[15]  Hsinchun Chen,et al.  The topology of dark networks , 2008, Commun. ACM.

[16]  Mark S. Granovetter The Strength of Weak Ties , 1973, American Journal of Sociology.

[17]  Albert-László Barabási,et al.  Error and attack tolerance of complex networks , 2000, Nature.

[18]  J. Reichardt,et al.  Statistical mechanics of community detection. , 2006, Physical review. E, Statistical, nonlinear, and soft matter physics.

[19]  Ning He,et al.  Efficient calculation of the robustness measure R for complex networks , 2017 .

[20]  Zhao Yang,et al.  A Comparative Analysis of Community Detection Algorithms on Artificial Networks , 2016, Scientific Reports.

[21]  Pasquale De Meo,et al.  On Facebook, most ties are weak , 2012, Commun. ACM.

[22]  P. Duijn,et al.  The Relative Ineffectiveness of Criminal Network Disruption , 2014, Scientific Reports.

[23]  Donald E. Knuth,et al.  The Art of Computer Programming, Volume 4, Fascicle 0: Introduction to Combinatorial Algorithms and Boolean Functions (Art of Computer Programming) , 2008 .

[24]  Réka Albert,et al.  Near linear time algorithm to detect community structures in large-scale networks. , 2007, Physical review. E, Statistical, nonlinear, and soft matter physics.

[25]  Matthieu Latapy,et al.  Computing Communities in Large Networks Using Random Walks , 2004, J. Graph Algorithms Appl..

[26]  Jean-Loup Guillaume,et al.  Fast unfolding of communities in large networks , 2008, 0803.0476.

[27]  M. Newman,et al.  Finding community structure in networks using the eigenvectors of matrices. , 2006, Physical review. E, Statistical, nonlinear, and soft matter physics.

[28]  Hans J. Herrmann,et al.  Mitigation of malicious attacks on networks , 2011, Proceedings of the National Academy of Sciences.

[29]  Matjaz Perc,et al.  Statistical physics of crime: A review , 2014, Physics of life reviews.

[30]  Juan Carlos González-Avella,et al.  Fast Fragmentation of Networks Using Module-Based Attacks , 2015, PloS one.

[31]  S. Havlin,et al.  Breakdown of the internet under intentional attack. , 2000, Physical review letters.

[32]  Robert E. Kooij,et al.  Graph measures and network robustness , 2013, ArXiv.

[33]  Leonard M. Freeman,et al.  A set of measures of centrality based upon betweenness , 1977 .