False Positive and False Negative Effects on Network Attacks

Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

[1]  Youki Kadobayashi,et al.  Exploring attack graph for cost-benefit security hardening: A probabilistic approach , 2013, Comput. Secur..

[2]  Zhao Yang Dong,et al.  Exploring Reliable Strategies for Defending Power Systems Against Targeted Attacks , 2011, IEEE Transactions on Power Systems.

[3]  Fernando M. V. Ramos,et al.  Software-Defined Networking: A Comprehensive Survey , 2014, Proceedings of the IEEE.

[4]  Harry Eugene Stanley,et al.  The cost of attack in competing networks , 2015, Journal of The Royal Society Interface.

[5]  Mario Ventresca,et al.  Network robustness versus multi-strategy sequential attack , 2015, J. Complex Networks.

[6]  Amir Bashan,et al.  Localized attacks on spatially embedded networks with dependencies , 2015, Scientific Reports.

[7]  Harry Eugene Stanley,et al.  Percolation of localized attack on complex networks , 2014, ArXiv.

[8]  Jure Leskovec,et al.  Community Structure in Large Networks: Natural Cluster Sizes and the Absence of Large Well-Defined Clusters , 2008, Internet Math..

[9]  Filippo Radicchi,et al.  Percolation in real interdependent networks , 2015, Nature Physics.

[10]  Christos Faloutsos,et al.  Node Immunization on Large Graphs: Theory and Algorithms , 2016, IEEE Transactions on Knowledge and Data Engineering.

[11]  Shouhuai Xu,et al.  Robustness of non-interdependent and interdependent networks against dependent and adaptive attacks , 2017 .

[12]  Harry Eugene Stanley,et al.  Catastrophic cascade of failures in interdependent networks , 2009, Nature.

[13]  Jean-Loup Guillaume,et al.  Impact of random failures and attacks on Poisson and power-law random networks , 2009, ACM Comput. Surv..

[14]  Dan Braha,et al.  From Centrality to Temporary Fame: Dynamic Centrality in Complex Networks , 2006, Complex..

[15]  David B. Dunson,et al.  Bayesian Data Analysis , 2010 .

[16]  Ing-Ray Chen,et al.  Adaptive Network Defense Management for Countering Smart Attack and Selective Capture in Wireless Sensor Networks , 2015, IEEE Transactions on Network and Service Management.

[17]  Yilun Shang,et al.  Localized recovery of complex networks against failure , 2016, Scientific Reports.

[18]  S. Havlin,et al.  Breakdown of the internet under intentional attack. , 2000, Physical review letters.

[19]  Yilun Shang,et al.  Subgraph Robustness of Complex Networks Under Attacks , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[20]  Sergey N. Dorogovtsev,et al.  Evolution of Networks: From Biological Nets to the Internet and WWW (Physics) , 2003 .

[21]  Albert-László Barabási,et al.  Error and attack tolerance of complex networks , 2000, Nature.

[22]  Shui Yu,et al.  Predicted Packet Padding for Anonymous Web Browsing Against Traffic Analysis Attacks , 2012, IEEE Transactions on Information Forensics and Security.

[23]  S. Bornholdt,et al.  Scale-free topology of e-mail networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[24]  Mark Newman,et al.  Networks: An Introduction , 2010 .

[25]  Shlomo Havlin,et al.  How breadth of degree distribution influences network robustness: comparing localized and random attacks. , 2015, Physical review. E, Statistical, nonlinear, and soft matter physics.

[26]  D S Callaway,et al.  Network robustness and fragility: percolation on random graphs. , 2000, Physical review letters.

[27]  Vinko Zlatic,et al.  Robustness and assortativity for diffusion-like processes in scale-free networks , 2011, ArXiv.

[28]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[29]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[30]  Reuven Cohen,et al.  Stability and topology of scale-free networks under attack and defense strategies. , 2005, Physical review letters.

[31]  H. Stanley,et al.  Structure of shells in complex networks. , 2009, Physical review. E, Statistical, nonlinear, and soft matter physics.

[32]  Harry Eugene Stanley,et al.  $k$-core percolation on complex networks: Comparing random, localized and targeted attacks , 2016, Physical review. E.

[33]  Kevin A. Kwiat,et al.  Improving System Reliability Against Rational Attacks Under Given Resources , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[34]  Reuven Cohen,et al.  Efficient immunization strategies for computer networks and populations. , 2002, Physical review letters.

[35]  Harry Eugene Stanley,et al.  Assortativity Decreases the Robustness of Interdependent Networks , 2012, Physical review. E, Statistical, nonlinear, and soft matter physics.

[36]  Béla Bollobás,et al.  Random Graphs , 1985 .

[37]  Marc Barthelemy,et al.  Spatial Networks , 2010, Encyclopedia of Social Network Analysis and Mining.

[38]  T. Killingback,et al.  Attack Robustness and Centrality of Complex Networks , 2013, PloS one.

[39]  Harry Eugene Stanley,et al.  Robustness of interdependent networks under targeted attack , 2010, Physical review. E, Statistical, nonlinear, and soft matter physics.

[40]  Yilun Shang,et al.  Vulnerability of networks: fractional percolation on random graphs. , 2014, Physical review. E, Statistical, nonlinear, and soft matter physics.

[41]  H. Stanley,et al.  Breakdown of interdependent directed networks , 2016, Proceedings of the National Academy of Sciences.

[42]  H E Stanley,et al.  Classes of small-world networks. , 2000, Proceedings of the National Academy of Sciences of the United States of America.

[43]  M. Newman,et al.  Random graphs with arbitrary degree distributions and their applications. , 2000, Physical review. E, Statistical, nonlinear, and soft matter physics.

[44]  Yilun Shang,et al.  Degree distribution dynamics for disease spreading with individual awareness , 2015, J. Syst. Sci. Complex..

[45]  Piet Van Mieghem,et al.  Epidemic processes in complex networks , 2014, ArXiv.