Applying Percolation Theory

Unlike the previous chapter where propagation of failures along the dependency links was studied in a qualitative, human-judgment fashion, this chapter offers an approach to analyzing resilience to failure propagation via a rigorous use of percolation theory. In percolation theory, the basic idea is that a node failure or an edge failure (reverse) percolates throughout a network, and, accordingly, the failure affects the connectivity among nodes. The degree of network resilience can be measured by the size of a largest component (or cluster) after a fraction of nodes or edges are removed in the network. In many cybersecurity applications, the underlying ideas of percolation theory have not been much explored. In this chapter, it is explained how percolation theory can be used to measure network resilience in the process of dealing with different types of network failures. It introduces the measurement of adaptability and recoverability in addition to that of fault tolerance as new contributions to measuring network resilience by applying percolation theory.

[1]  Wenye Wang,et al.  On the critical phase transition time of wireless multi-hop networks with random failures , 2008, MobiCom '08.

[2]  Albert-László Barabási,et al.  Error and attack tolerance of complex networks , 2000, Nature.

[3]  Thomas M A Fink,et al.  Easily repairable networks: reconnecting nodes after damage. , 2014, Physical review letters.

[4]  Albert-Lszl Barabsi,et al.  Network Science , 2016, Encyclopedia of Big Data.

[5]  Donald F. Towsley,et al.  Robust multipath routing in large wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.

[6]  H. Stanley,et al.  Spontaneous recovery in dynamical networks , 2013, Nature Physics.

[7]  J. Hammersley,et al.  Percolation processes , 1957, Mathematical Proceedings of the Cambridge Philosophical Society.

[8]  D S Callaway,et al.  Network robustness and fragility: percolation on random graphs. , 2000, Physical review letters.

[9]  Edmund M. Yeh,et al.  Wireless network resilience to degree-dependent and cascading node failures , 2009, 2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks.

[10]  Sune Lehmann,et al.  Robustness and modular structure in networks , 2011, Network Science.

[11]  Jean-Luc Gaudiot,et al.  Network Resilience: A Measure of Network Fault Tolerance , 1990, IEEE Trans. Computers.

[12]  M E J Newman,et al.  Community structure in social and biological networks , 2001, Proceedings of the National Academy of Sciences of the United States of America.

[13]  Jin-Hee Cho,et al.  Cyber War Game in Temporal Networks , 2016, PloS one.

[14]  Josep Freixas,et al.  The influence of the node criticality relation on some measures of component importance , 2008, Oper. Res. Lett..

[15]  Kousuke Yakubo,et al.  Overload Network Failures: An Approach from the Random-Walk Model , 2013, 2013 International Conference on Signal-Image Technology & Internet-Based Systems.

[16]  Yacov Y Haimes,et al.  On the Definition of Resilience in Systems , 2009, Risk analysis : an official publication of the Society for Risk Analysis.

[17]  Igor Linkov,et al.  Resilience metrics for cyber systems , 2013, Environment Systems and Decisions.

[18]  M. Newman,et al.  Epidemics and percolation in small-world networks. , 1999, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.

[19]  Shlomo Havlin,et al.  Recent advances on failure and recovery in networks of networks , 2016 .

[20]  Shouhuai Xu,et al.  Metrics and measurement of trustworthy systems , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.

[21]  Jin Zhang,et al.  An approach to finding the cost-effective immunization targets for information assurance , 2014, Decis. Support Syst..

[22]  A. Robert Calderbank,et al.  The Effect of Eavesdroppers on Network Connectivity: A Secrecy Graph Approach , 2011, IEEE Transactions on Information Forensics and Security.

[23]  Cohen,et al.  Resilience of the internet to random breakdowns , 2000, Physical review letters.

[24]  Harry Eugene Stanley,et al.  Percolation of localized attack on complex networks , 2014, ArXiv.

[25]  Kwang-Cheng Chen,et al.  Smart attacks in smart grid communication networks , 2012, IEEE Communications Magazine.

[26]  M. Newman,et al.  Fast Monte Carlo algorithm for site or bond percolation. , 2001, Physical review. E, Statistical, nonlinear, and soft matter physics.

[27]  Charles J. Colbourn,et al.  Network resilience , 1987 .

[28]  T. Vicsek,et al.  Uncovering the overlapping community structure of complex networks in nature and society , 2005, Nature.

[29]  Jure Leskovec,et al.  Learning to Discover Social Circles in Ego Networks , 2012, NIPS.

[30]  Lei Sun,et al.  Understanding Blackholes in large-scale Cognitive Radio Networks under generic failures , 2013, 2013 Proceedings IEEE INFOCOM.

[31]  B. Bollobás The evolution of random graphs , 1984 .

[32]  Éva Tardos,et al.  Which Networks are Least Susceptible to Cascading Failures? , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.

[33]  Divyakant Agrawal,et al.  Limiting the spread of misinformation in social networks , 2011, WWW.

[34]  David Hutchison,et al.  Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines , 2010, Comput. Networks.

[35]  Y. Narahari,et al.  Influence limitation in multi-campaign social networks: A Shapley value based approach , 2012, 2012 IEEE International Conference on Automation Science and Engineering (CASE).

[36]  Yi Xu,et al.  Characterizing the Spread of Correlated Failures in Large Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[37]  Carl E. Landwehr,et al.  Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.

[38]  M. Newman,et al.  Scaling and percolation in the small-world network model. , 1999, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.

[39]  Cheng Wang,et al.  Small Cluster in Cyber Physical Systems: Network Topology, Interdependence and Cascading Failures , 2015, IEEE Transactions on Parallel and Distributed Systems.

[40]  Fan Chung,et al.  A Brief Survey of PageRank Algorithms , 2014, IEEE Transactions on Network Science and Engineering.