Skip to main content

Simulation Results

  • Chapter
  • First Online:
Book cover Network Robustness under Large-Scale Attacks

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

  • 613 Accesses

Abstract

In this chapter, we present the simulation results of this monograph. In the first part, we present the simulation results to evaluate both the link-level and network-wide robustness of the LCR random network under area attacks and compare it against that of the traditional random network. In the second part, we show the simulation results on a fiber plant of a major network provider [56]. We first assume that the topology information of this fiber network is known and show the expected number of attacked links by using the theoretical result of the fixed network case. Then without knowing the detail information about this fiber network but only some high-level statistical information, such like the node number, the link number, and the link length, we present the results by assuming that the fiber network is a LCR random network and a traditional random network, respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Boesch FT, Harary F, Kabell JA (1981) Networks 11(1):57–63. doi:10.1002/net. 3230110106

    Article  MathSciNet  MATH  Google Scholar 

  2. Phillips CA (1993) In: Proceedings of ACM symposium on theory of computing, vol 25. ACM, New York, p 776. doi:10.1145/167088.167286

    Google Scholar 

  3. Wood RK (1993) Math Comput Model 17(2):1. doi:10.1016/0895-7177(93)90236-R

    Article  MATH  Google Scholar 

  4. Bingol L (2001) A lagrangian heuristic for solving a network interdiction problem. Master’s thesis, Naval Postgraduate School

    Google Scholar 

  5. Royset JO, Wood RK (2008) INFORMS J Comput 19(2):175. doi:10.1287/ijoc.1060. 0191

    Article  MathSciNet  Google Scholar 

  6. Motter AE, Lai YC (2002) Phys Rev E 66(6):065102. doi:10.1103/PhysRevE.66. 065102

    Article  Google Scholar 

  7. Sachtjen M, Carreras B, Lynch V (2000) Phys Rev E 61(5):4877. doi:10.1103/ PhysRevE.61.4877

    Article  Google Scholar 

  8. Goh KI, Kahng B, Kim D (2002) Phys Rev Lett 88(10):108701. doi:10.1103/ PhysRevLett.88.108701

    Article  Google Scholar 

  9. Watts D (2002) Proc Natl Acad Sci 99(9), 5766. doi:10.1073/pnas.082090499

    Article  MathSciNet  MATH  Google Scholar 

  10. Moreno Y, Gomez J, Pacheco A (2002) Europhys Lett 58(4):630. doi:10.1209/epl/ i2002-00442-2

    Article  Google Scholar 

  11. Willinger W, Govindan R, Jamin S, Paxson V, Shenker S (2002) Proc Natl Acad Sci 99(1), 2573. doi:10.1073/pnas.012583099

    Article  Google Scholar 

  12. Callaway DS, Newman MEJ, Strogatz SH, Watts DJ (2000) Phys Rev Lett 85:5468. doi:10.1103/PhysRevLett.85.5468

    Article  Google Scholar 

  13. Ball F, Mollison D, Scalia-Tomba G (1997) Ann Appl Probab 7(1):46. doi:10.1214/ aoap/1034625252

    Article  MathSciNet  MATH  Google Scholar 

  14. Newman MEJ, Watts DJ (1999) Phys Rev E 60(6):7332. doi:10.1103/PhysRevE.60. 7332

    Article  Google Scholar 

  15. Cohen R, Erez K, ben Avraham D, Havlin S (2000) Phys Rev Lett 85:4624. doi:10.1103/PhysRevLett.85.4626

    Google Scholar 

  16. Zhou Q, Gao L, Cui S (2010) In: Proceedings of IEEE GLOBECOM. IEEE, Piscataway, pp 368–372. doi:10.1109/GLOCOMW.2010.5700343

    Google Scholar 

  17. Foster JS, Gjelde E, Graham WR, Hermann RJ, Kluepfel HM, Lawson RL, Soper GK, Wood LL, Woodard JB (2004) Report of the commission to assess the threat to the united states from electromagnetic pulse (emp) attack. http://www.empcommission.org/docs/empctextunderscoreexectextunderscorerpt.pdf. Accessed 20 Apr 2012

  18. Radasky W (2007) High-altitude electromagnetic pulse (hemp): a threat to our way of life. http://www.todaysengineer.org/2007/Sep/HEMP.asp. Accessed 20 Apr 2012

  19. Ozdamar L, Ekinci E, Kucukyazici B (2004) Ann Oper Res 129:217. doi:10.1023/B: ANOR.0000030690.27939.39

    Article  MathSciNet  Google Scholar 

  20. Radwan AE, Hobeika AG, Sivasailam D (1985) Inst Transp Eng J 55(9):25

    Google Scholar 

  21. Young S, Balluz L, Malilay J (2004) Sci Total Environ 322:3. doi:10.1016/ S0048-9697(03)00446-7

    Article  Google Scholar 

  22. Feng QS, Chen JF, Ai MY (2010) J Acta Petrolei Sinica 1:139

    Google Scholar 

  23. Wang JW, Rong LL (2009) Elsevier Saf Sci 47(10):1332. doi:10.1016/j.ssci.2009.02.002

    Article  Google Scholar 

  24. Pastor-Satorras R, Vazquez A, Vespignani A (2001) Phys Rev Lett 87(25):258701. doi:10.1103/PhysRevLett.87.258701

    Article  Google Scholar 

  25. Cohen R, Erez K, Ben-Avraham D, Havlin S (2001) Phys Rev Lett 86(16):3682. doi:10.1103/PhysRevLett.86.3682

    Article  Google Scholar 

  26. Gligor VD (1984) Proc IEEE Trans Softw Eng 10(3), 320. doi:10.1109/TSE.1984. 5010241

    Article  Google Scholar 

  27. Peng T, Leckie C, Ramamohanarao K (2007) ACM Comput Surv 39(1):1. doi:10. 1145/1216370.1216373

    Article  Google Scholar 

  28. Mirkovic J, Reiher P (2004) ACM Comput Commun Rev 34(2):39. doi:10.1145/ 997150.997156

    Article  Google Scholar 

  29. Burch H, Cheswick B (2000) In: Proceedings of the USENIX LISA. USENIX Association, Berkeley, pp 319–327

    Google Scholar 

  30. Savage S, Wetherall D, Karlin A, Anderson T (2000) ACM Comput Commun Rev 30(4):295. doi:10.1145/347057.347560

    Article  Google Scholar 

  31. Snoeren AC, Partridge C, Sanchez LA, Jones CE, Tehakountio F, Kent ST, Strayer WT (2001) ACM Comput Commun Rev 31(4):3. doi:10.1145/964723.383060

    Article  Google Scholar 

  32. Albert R, Jeong H, Barabasi AL (1999) Nature 6749:130

    Google Scholar 

  33. Barabasi AL, Albert R (1999) Science 286(5439):509

    Article  MathSciNet  Google Scholar 

  34. Barabasi AL, Albert R, Jeong H (2000) Phys A Stat Mech Appl 281(1–4):69. doi:10.1016/S0378-4371(00)00018-2

    Article  Google Scholar 

  35. Faloutsos M, Faloutsos P, Faloutsos C (1999) Comput Commun Rev 29(4):251. doi:10.1145/316194.316229

    Article  Google Scholar 

  36. Li W, Cai X (2004) Phys Rev E 69(4):046106. doi:10.1103/PhysRevE.69.046106

    Article  Google Scholar 

  37. Albert R, Jeong H, Barabasi AL (2000) Nature 406(6794):378. doi:10.1038/35019019

    Article  Google Scholar 

  38. Neumayer S, Zussman G, Cohen R, Modiano E (2009) In: Proceedings of IEEE INFOCOM. IEEE, Piscataway, pp 1566–1574. doi:10.1109/INFCOM.2009.5062074

    Google Scholar 

  39. Brown G, Carlyle WM, Salmeron J, Wood K (2005) Tutorials in operations research. INFORMS, Hanover, pp 102–123

    Google Scholar 

  40. Brown G, Carlyle M, Salmeron J, Wood K (2006) Informs 36(6):530. doi:10.1287/ inte.1060.0252

    Google Scholar 

  41. Kephart J, White S (1991) IEEE computer society symposium on research in security and privacy. IEEE, Los Alamitos, pp 343–359. doi:10.1109/RISP.1991.130801

    Google Scholar 

  42. Gallos LK, Cohen R, Argyrakis P, Bunde A, Havlin S (2005) Phys Rev Lett 94(18):188701. doi:10.1103/PhysRevLett.94.188701

    Google Scholar 

  43. Magoni D (2003) IEEE J Sel Areas Commun 21(6):949. doi:10.1109/JSAC.2003. 814364

    Google Scholar 

  44. Agarwal P, Efrat A, Ganjugunte S, Sankararaman S, Hay D, Zussman G (2011) In: Proceedings of IEEE INFOCOM. IEEE, New York, pp 1521–1529. doi:10.1109/ INFCOM.2011.5934942

    Google Scholar 

  45. Sen A, Banerjee S, Ghosh P, Shirazipourazad S (2009) In: Proceedings 47th annual allerton conference on communication, control, and computing. IEEE, Piscataway, pp 1430–1437. doi:10.1109/ALLERTON.2009.5394506

    Google Scholar 

  46. Liu J, Jiang X, Nishiyama H, Kato N (2011) IEEE Trans Veh Technol 60(5):2253. doi:10.1109/TVT.2011.2114684

    Google Scholar 

  47. Kim K, Venkatasabramanian N (2010) In: Proceedings of IEEE GLOBECOM. IEEE, Piscataway, pp 1–5. doi:10.1109/GLOCOM.2010.5685229

    Google Scholar 

  48. Neumayer S, Modiano E (2010) In: Proceedings of IEEE INFOCOM. IEEE, New York, pp 1–9. doi:10.1109/INFCOM.2010.5461984

    Google Scholar 

  49. Mathew P (2003) Random geometric graphs. Oxford University Press, Oxford

    Google Scholar 

  50. Mathew P (2003) Random geometric graphs. Oxford University Press, Oxford

    MATH  Google Scholar 

  51. Schlick T (2002) Molecular modeling and simulation: an interdisciplinary guide. Springer, New York

    MATH  Google Scholar 

  52. Manna SS, Sen P (2002) Phys Rev E 66(3):066114. doi:10.1103/PhysRevE.66.066114

    Google Scholar 

  53. Ebel H, Mielsch L, Bornholdt S (2002) Phys Rev E 66:35103. doi:10.1103/PhysRevE. 66.035103

    Article  Google Scholar 

  54. Meester R, Roy R (1996) Continuum percolation. Cambridge University Press, New York

    Book  MATH  Google Scholar 

  55. Chung F, Lu L (2003) Internet Math 1(1):91. doi:10.1080/15427951.2004.10129081

    Article  MathSciNet  MATH  Google Scholar 

  56. Level 3 Communication Corp (2012) Level 3 communications network map. http://www.level3.com/en/resource-library/maps/level-3-network-map/. Accessed 20 Apr 2012

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2013 The Authors

About this chapter

Cite this chapter

Zhou, Q., Gao, L., Liu, R., Cui, S. (2013). Simulation Results. In: Network Robustness under Large-Scale Attacks. SpringerBriefs in Computer Science. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-4860-0_5

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-4860-0_5

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-4859-4

  • Online ISBN: 978-1-4614-4860-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics