Characterizing the Robustness of Complex Networks

With increasingly ambitious initiatives such as GENI and FIND that seek to design the future Internet, it becomes imperative to define the characteristics of robust topologies, and build future networks optimized for robustness. This paper investigates the characteristics of network topologies that maintain a high level of throughput in spite of multiple attacks. To this end, we select network topologies belonging to the main network models and some real world networks. We consider three types of attacks: removal of random nodes, high degree nodes, and high betweenness nodes. We use elasticity as our robustness measure and, through our analysis, illustrate that different topologies can have different degrees of robustness. In particular, elasticity can fall as low as 0.8% of the upper bound based on the attack employed. This result substantiates the need for optimized network topology design. Furthermore, we implement a tradeoff function that combines elasticity under the three attack strategies and considers the cost of the network. Our extensive simulations show that, for a given network density, regular and semi-regular topologies can have higher degrees of robustness than heterogeneous topologies, and that link redundancy is a sufficient but not necessary condition for robustness.

[1]  Jun Dong,et al.  Understanding network concepts in modules , 2007, BMC Systems Biology.

[2]  Ion Stoica,et al.  Characterizing selfishly constructed overlay routing networks , 2004, IEEE INFOCOM 2004.

[3]  Bin Liu,et al.  Spectral Measure of Robustness in Complex Networks , 2008 .

[4]  D. R. Lick,et al.  The Theory and Applications of Graphs. , 1983 .

[5]  Almerima Jamakovic,et al.  Influence of the network structure on robustness , 2007, 2007 15th IEEE International Conference on Networks.

[6]  Albert-László Barabási,et al.  Scale-free networks , 2008, Scholarpedia.

[7]  Massimo Marchiori,et al.  Error and attacktolerance of complex network s , 2004 .

[8]  I. Frisch,et al.  Analysis and Design of Survivable Networks , 1970 .

[9]  Judith Sylvester,et al.  CNN , 2003 .

[10]  S. Havlin,et al.  Optimization of robustness of complex networks , 2004, cond-mat/0404331.

[11]  S. Low,et al.  The "robust yet fragile" nature of the Internet. , 2005, Proceedings of the National Academy of Sciences of the United States of America.

[12]  Christos H. Papadimitriou,et al.  Heuristically Optimized Trade-Offs: A New Paradigm for Power Laws in the Internet , 2002, ICALP.

[13]  Dieter Gollmann,et al.  Computer Security , 1979, Lecture Notes in Computer Science.

[14]  S. Havlin,et al.  Optimization of network robustness to waves of targeted and random attacks. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[15]  Walter Willinger,et al.  Understanding Internet topology: principles, models, and validation , 2005, IEEE/ACM Transactions on Networking.

[16]  Bojan Mohar,et al.  Isoperimetric numbers of graphs , 1989, J. Comb. Theory, Ser. B.

[17]  Priya Mahadevan,et al.  Lessons from Three Views of the Internet Topology , 2005, ArXiv.

[18]  kc claffy,et al.  Impact of Degree Correlations on Topology Generators , 2005, SIGCOMM 2005.

[19]  Junming Xu,et al.  Theory and Application of Graphs , 2003, Network Theory and Applications.

[20]  Vasek Chvátal,et al.  Tough graphs and hamiltonian circuits , 1973, Discret. Math..

[21]  Christos Gkantsidis,et al.  Spectral analysis of Internet topologies , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[22]  Priya Mahadevan,et al.  The internet AS-level topology: three data sources and one definitive metric , 2005, Comput. Commun. Rev..

[23]  Priya Mahadevan,et al.  Orbis: rescaling degree correlations to generate annotated internet topologies , 2007, SIGCOMM 2007.

[24]  H. Stanley,et al.  Optimization of network robustness to random breakdowns , 2005, cond-mat/0507249.

[25]  Michalis Faloutsos,et al.  Jellyfish: A conceptual model for the as Internet topology , 2006, Journal of Communications and Networks.

[26]  Priya Mahadevan,et al.  Systematic topology analysis and generation using degree correlations , 2006, SIGCOMM.

[27]  Priya Mahadevan,et al.  Orbis: rescaling degree correlations to generate annotated internet topologies , 2007, SIGCOMM '07.

[28]  H. A. Jung,et al.  On a class of posets and the corresponding comparability graphs , 1978, J. Comb. Theory B.

[29]  Albert-László Barabási,et al.  Error and attack tolerance of complex networks , 2000, Nature.

[30]  Xu Junming,et al.  On conditional edge-connectivity of graphs , 2000 .

[31]  Walter Willinger,et al.  Network topology generators: degree-based vs. structural , 2002, SIGCOMM 2002.

[32]  Matt Bishop,et al.  What Is Computer Security? , 2003, IEEE Secur. Priv..

[33]  Robert E. Kooij,et al.  ELASTICITY: Topological Characterization of Robustness in Complex Networks , 2008, BIONETICS.

[34]  J Xu ON CONDITIONAL EDGE-CONNECTIVITY OF GRAPHS , 2000 .

[35]  M. Krishnamoorthy,et al.  Fault diameter of interconnection networks , 1987 .

[36]  César A. Hidalgo,et al.  Scale-free networks , 2008, Scholarpedia.

[37]  Christos Faloutsos,et al.  Epidemic spreading in real networks: an eigenvalue viewpoint , 2003, 22nd International Symposium on Reliable Distributed Systems, 2003. Proceedings..

[38]  Noga Alon,et al.  Eigenvalues and expanders , 1986, Comb..

[39]  Scott Shenker,et al.  On a network creation game , 2003, PODC '03.

[40]  S. Louis Hakimi,et al.  On Computing a Conditional Edge-Connectivity of a Graph , 1988, Inf. Process. Lett..