Abstract:
We propose measures of network vulnerability and study some of their properties. We define a network as a triplet (G,R,F), where G is the graph of the network, R is the r...Show MoreMetadata
Abstract:
We propose measures of network vulnerability and study some of their properties. We define a network as a triplet (G,R,F), where G is the graph of the network, R is the routing protocol specifying how traffic flows on G, and F is the traffic load (typically random). Based on this structure, we calculate the expected loss of traffic from an "attack" which eliminates ttimes100% of the network's links. The result is a network vulnerability curve (NVC) measuring expected loss as a function of t,0lestles1. Clearly, different attack strategies (e.g., random versus malicious) could cause different levels of damages so, accordingly, we define four key NVCs: malicious, greedy, random, and Bernoulli, and study their mathematical properties. Some extensions are discussed
Published in: IEEE Signal Processing Letters ( Volume: 14, Issue: 5, May 2007)