K-core-based attack to the internet: Is it more malicious than degree-based attack?

K-core (k-shell) is an interesting measure that discriminates the core and fringe nodes in a complex network. Recent studies have revealed that some nodes of high k-core values may play a vital role in information diffusion. As a result, one may expect that attacking the nodes of high k-core values preferentially will collapse the Internet easily. To our surprise, however, the experiments on two Internet AS-level topologies show that: Although a k-core-based attack is feasible in reality, it is actually less effective than the classic degree-based attack. Indeed, as indicated by the measure normalized susceptibility, we need to remove 2 % to 3 % more nodes in a k-core-based attack in order to collapse the networks. Further investigation on the nodes in a same shell discloses that these nodes often have drastically varying degrees, among which are the nodes of high k-core values but low degrees. These nodes cannot lead to sufficient link deletions in the early stage of a k-core-based attack, and therefore make it less malicious than a degree-based attack. Finally, a strategy called “ELL” is employed for the Internet enhancement. Experiments demonstrate that “ELL” can greatly improve the Internet robustness at very small costs.

[1]  Massimo Marchiori,et al.  Error and attacktolerance of complex network s , 2004 .

[2]  Jari Saramäki,et al.  Emergence of communities in weighted networks. , 2007, Physical review letters.

[3]  Guanhua Yan,et al.  Criticality analysis of Internet infrastructure , 2010, Comput. Networks.

[4]  Stefan Wuchty,et al.  Peeling the yeast protein network , 2005, Proteomics.

[5]  Martin Everett,et al.  Ego network betweenness , 2005, Soc. Networks.

[6]  Beom Jun Kim,et al.  Attack vulnerability of complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[7]  Dmitri V. Krioukov,et al.  Evolution of the Internet AS-Level Ecosystem , 2009, Complex.

[8]  Shi Xiao,et al.  On imperfect node protection in complex communication networks , 2011 .

[9]  Benoit Donnet,et al.  Internet topology discovery: a survey , 2007, IEEE Communications Surveys & Tutorials.

[10]  Yakov Rekhter,et al.  A Border Gateway Protocol 4 (BGP-4) , 1994, RFC.

[11]  U. Brandes A faster algorithm for betweenness centrality , 2001 .

[12]  Katarzyna Musial,et al.  Creation and growth of online social network , 2013, World Wide Web.

[13]  Yuval Shavitt,et al.  A model of Internet topology using k-shell decomposition , 2007, Proceedings of the National Academy of Sciences.

[14]  Cohen,et al.  Resilience of the internet to random breakdowns , 2000, Physical review letters.

[15]  Richard G. Clegg,et al.  A critical look at power law modelling of the Internet , 2009, Comput. Commun..

[16]  Ke Xu,et al.  Enhancing the robustness of scale-free networks , 2009, ArXiv.

[17]  Yougu Yuan,et al.  Internet worms and global routing instabilities , 2002, SPIE ITCom.

[18]  Marián Boguñá,et al.  Percolation in self-similar networks , 2011, Physical review letters.

[19]  David Hutchison,et al.  Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines , 2010, Comput. Networks.

[20]  V Latora,et al.  Efficient behavior of small-world networks. , 2001, Physical review letters.

[21]  Reuven Cohen,et al.  Efficient immunization strategies for computer networks and populations. , 2002, Physical review letters.

[22]  Mark E. J. Newman,et al.  Power-Law Distributions in Empirical Data , 2007, SIAM Rev..

[23]  Sergey N. Dorogovtsev,et al.  K-core Organization of Complex Networks , 2005, Physical review letters.

[24]  Alessandro Vespignani,et al.  K-core Decomposition: a Tool for the Visualization of Large Scale Networks , 2005, ArXiv.

[25]  Hai Zhao,et al.  Characterizing and modeling the Internet Router-level topology - The hierarchical features and HIR model , 2010, Comput. Commun..

[26]  Stephen B. Seidman,et al.  Network structure and minimum degree , 1983 .

[27]  Hans J. Herrmann,et al.  Mitigation of malicious attacks on networks , 2011, Proceedings of the National Academy of Sciences.

[28]  Jean-Loup Guillaume,et al.  Relevance of massively distributed explorations of the Internet topology: Qualitative results , 2006, Comput. Networks.

[29]  Marián Boguñá,et al.  Sustaining the Internet with Hyperbolic Mapping , 2010, Nature communications.

[30]  Shi Zhou,et al.  Accurately modeling the Internet topology , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[31]  K. Claffy,et al.  Topology discovery by active probing , 2002, Proceedings 2002 Symposium on Applications and the Internet (SAINT) Workshops.

[32]  Marco Tomassini,et al.  Worldwide spreading of economic crisis , 2010, 1008.3893.

[33]  S. Havlin,et al.  Optimization of network robustness to waves of targeted and random attacks. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[34]  Tao Zhou,et al.  Evolution of the Internet and its cores , 2008 .

[35]  Katarzyna Musial,et al.  Social networks on the Internet , 2012, World Wide Web.

[36]  Lev Muchnik,et al.  Identifying influential spreaders in complex networks , 2010, 1001.5285.

[37]  S. Havlin,et al.  Breakdown of the internet under intentional attack. , 2000, Physical review letters.

[38]  Dongwon Lee,et al.  Graph Theoretic Topological Analysis of Web Service Networks , 2009, World Wide Web.

[39]  Hai Zhuge,et al.  Modeling and navigation of social information networks in metric spaces , 2013, World Wide Web.

[40]  Jaideep Srivastava,et al.  Exploiting small world property for network clustering , 2013, World Wide Web.

[41]  M. Faloutsos The internet AS-level topology: three data sources and one definitive metric , 2006, CCRV.

[42]  Alessandro Vespignani,et al.  Immunization of complex networks. , 2001, Physical review. E, Statistical, nonlinear, and soft matter physics.

[43]  Peter V. Marsden,et al.  Egocentric and sociocentric measures of network centrality , 2002, Soc. Networks.

[44]  Patrick D. McDaniel,et al.  A Survey of BGP Security Issues and Solutions , 2010, Proceedings of the IEEE.

[45]  Alessandro Vespignani,et al.  Epidemic spreading in scale-free networks. , 2000, Physical review letters.

[46]  David M. Nicol,et al.  A mixed abstraction level simulation model of large-scale Internet worm infestations , 2002, Proceedings. 10th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems.