Strategies for network security

Security of networks has become an increasingly important issue in the highly connected world. Security depends on attacks. Typical attacks include both cascading failure of virus spreading and of information propagation and physical attacks of removal of nodes or edges. Numerous experiments have shown that none of the existing models construct secure networks, and that the universal properties of power law and small world phenomenon of networks seem unavoidable obstacles for security of networks against attacks. Here, we propose a new strategy of attacks, the attack of rules of evolution of networks. By using the strategy, we proposed a new model of networks which generates provably secure networks. It was shown both analytically and numerically that the best strategy is to attack on the rules of the evolution of networks, that the second best strategy is the attack by cascading failure models, that the third best strategy is the physical attack of removal of nodes or edges, and that the least desirable strategy is the physical attack of deleting structures of the networks. The results characterize and classify the strategies for network security, providing a foundation for a security theory of networks. Equally important, our results demonstrate that security can be achieved provably by structures of networks, that there is a tradeoff between the roles of structures and of thresholds in security engineering, and that power law and small world property are never obstacles of security of networks. Our model explores a number of new principles of networks, including some topological principles, probabilistic principles, and combinatorial principles. The new principles build the foundation for new strategies for enhancing security of networks, and for new protocols of communications and security of the Internet and computer networks etc. We anticipate that our theory can be used in analyzing security of real systems in economy, society and technology.

[1]  S. Havlin,et al.  Breakdown of the internet under intentional attack. , 2000, Physical review letters.

[2]  Reuven Cohen,et al.  Efficient immunization strategies for computer networks and populations. , 2002, Physical review letters.

[3]  Hans J. Herrmann,et al.  Mitigation of malicious attacks on networks , 2011, Proceedings of the National Academy of Sciences.

[4]  Paul Erdös,et al.  On random graphs, I , 1959 .

[5]  Moti Yung,et al.  Proceedings of the 32nd international conference on Automata, Languages and Programming , 2005 .

[6]  Reuven Cohen,et al.  Cohen, Erez, ben-Avraham, and Havlin Reply: , 2001 .

[7]  Massimo Marchiori,et al.  Error and attacktolerance of complex network s , 2004 .

[8]  Abhijit Sarkar,et al.  Two-peak and three-peak optimal complex networks. , 2004, Physical review letters.

[9]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[10]  Éva Tardos,et al.  Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..

[11]  Adilson E Motter Cascade control and defense in complex networks. , 2004, Physical review letters.

[12]  Alessandro Vespignani,et al.  Epidemic spreading in scale-free networks. , 2000, Physical review letters.

[13]  S. Havlin,et al.  Optimization of network robustness to waves of targeted and random attacks. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[14]  Albert-László Barabási,et al.  Scale-Free Networks: A Decade and Beyond , 2009, Science.

[15]  E. Young Contagion , 2015, New Scientist.

[16]  Reuven Cohen,et al.  Reply: Cohen, Erez, ben-Avraham, and Havlin , 2001 .

[17]  R. May,et al.  Infectious Diseases of Humans: Dynamics and Control , 1991, Annals of Internal Medicine.

[18]  Duncan J Watts,et al.  A simple model of global cascades on random networks , 2002, Proceedings of the National Academy of Sciences of the United States of America.

[19]  S N Dorogovtsev,et al.  Comment on "breakdown of the Internet under intentional attack". , 2001, Physical review letters.

[20]  P. Kaye Infectious diseases of humans: Dynamics and control , 1993 .

[21]  B. Bollobás The evolution of random graphs , 1984 .

[22]  David D. Jensen,et al.  Navigating networks by using homophily and degree , 2008, Proceedings of the National Academy of Sciences.

[23]  Éva Tardos,et al.  Influential Nodes in a Diffusion Model for Social Networks , 2005, ICALP.

[24]  N. Stanietsky,et al.  The interaction of TIGIT with PVR and PVRL2 inhibits human NK cell cytotoxicity , 2009, Proceedings of the National Academy of Sciences.

[25]  Sun Tzu Sun Tzu - The Art of War , 2008 .

[26]  P. Erdos,et al.  On the evolution of random graphs , 1984 .