Abstract
Network robustness and network reliability are important issues in the design of Internet Service Providers’ topologies. In this paper, we examine the structural characteristics of network topologies that affect robustness and reliability. We examine the interplay between the structural characteristics of network topologies and the resource capacity over-provisioning strategies when the network breakdowns subject to practical constraints (router technology) and economic considerations (link costs). We study the robustness of the Internet connectivity under node intentional harmful attack using two attacks strategies: static degree-based and static load-based. We find that the robustness of network topologies is affected by the variation of their structural characteristics. In our proposed approach, we show that highly-heterogeneous topologies have less robustness compared with lightly-heterogeneous topologies. The observations from the robustness study provide us useful insights for proposing multiple efficient preventive resource capacity over-provisioning strategies for mitigation of intentional attacks. The proposed strategies utilize the structural properties by calculating the excess traffic in case of single global cascading failure for each node and measure its influence on the other nodes as well as locally. The results show that our proposed strategies can significantly enhance the robustness and increase the resilience of network topology. We also show that highly-heterogeneous topologies have high resilience compared with lightly-heterogeneous topologies. By using real data from the Sprint network at the router level, we provide further empirical evidence in support of the proposed approach.
Similar content being viewed by others
References
Bornholdt, S., & Schuster, H. G. (Eds.) (2003). Handbook of graphs and networks: from the genome to the internet. New York-Weinheim: Wiley-VCH.
Govindan, R., & Tangmunarunkit, H. (2000). Heuristics for internet map discovery. In Proc. IEEE INFOCOM, Tel Aviv, Israel (pp. 1371–1380).
Chang, H., Govindan, R., Jamin, S., Shenker, S., & Willinger, W. (2002). Toward capturing representative as-level internet topologies. In Proc. ACM SIGMETRICS, Marina Del Rey, CA, Jun. 2002 (pp. 280–281).
Albert, R., Jeong, H., & Barabasi, A.-L. (2000). Error and attack tolerance of complex networks. Nature, 406, 378–382.
Cohen, R., Erez, K., Ben-Avraham, D., & Halvin, S. (2001). Breakdown of the internet under intentional attack. Physical Review Letter, 86(16), 3682–3685.
Crucitti, P., Latora, V., Marchiori, M., & Rapisarda, A. (2003). Error and attack tolerance of complex networks. Physica, A 320, 622.
Magoni, D. (2003). Tearing down the internet. IEEE Journal on Selected Areas in Communications, 21(6), 949–960.
Doyle, J. C., Alderson, D. L., Li, L., Low, S., Roughan, M., Shalunov, S., Tanaka, R., & Willinger, W. (2005). The “robust yet fragile nature of the internet”. Proceedings of the National Academy of Sciences of the United States of America, 102(41), 14497–14502.
Holme, P., & Kim, B.J. (2002). Vertex overload breakdown in evolving networks. Physical Review Letters, E 65, 026139.
Holme, P. (2002). Edge overload breakdown in evolving networks. Physical Review Letters, E 65, 066109.
Holme, P., Kim, B.J., Yoon, C.N., & Han, S.K. (2002). Attack vulnerability of complex networks. Physical Review, E 65, 056109.
Motter, A. E., & Lai, Y. (2002). Cascade-based attacks on complex networks. Phys. Rev., E 66, 065102(R).
Xiao, S., & Xiao, G. (2006). On intentional attacks and protections in complex communication networks. In Proc. IEEE Globecom’06, Nov.–Dec. 2006.
Xiao, S., Xiao, G., & Cheng, T.H. (2008). Tolerance of intentional attacks in complex communication networks. IEEE Communications Magazine, 46(1), 146–152.
Beygelzimer, A., Grinstein, G. M., Linsker, R., & Rish, I. (2005). Improving network robustness by edge modification. Physica, A 375(3–4), 593–612.
Xiao, S., Xiao, G., & Cheng, T.H. (2006). Robustness of complex communication networks under rewiring operations. In Proc. IEEE ICCS’06, Oct-Nov. 2006.
Xiao, S., & Xiao, G. (2007). On local link repairing in complex communication networks under intentional attack. In Proc. ICICS, Dec. 2007.
Wang, Y., Xiao, G., Cheng, T.H., Xiao, S., & Fu, X. (2008). Robustness of complex communication networks under link attacks. In Proc. ICAIT’08, July 2008.
Albert, R., & Barabási, A. L. (2002). Statistical mechanics of complex networks. Reviews of Modern Physics, 74(1), 47–97.
Chung, F., & Lu, L. (2003). The average distance in a random graph with given expected degrees. Internet Mathematics, 1, 91–113.
Aiello, W., Chung, F., & Lu, L. (2000). A random graph model for massive graphs. In Proc. STOC 2000.
Li, L., Alderson, D., Willinger, W., & Doyle, J. (2004). A first-principles approach to understanding the internet’s router-level topology. ACM SIGCOMM Computer Communication Review, 34(4), 3–14.
Abilene Network (2004). Detailed information about the objectives, organization, and development of the Abilene network [Online]. Available: http://www.Internet2.edu/abilene.
Li, L., Alderson, D., Willinger, W., & Doyle, J. (2004). Topology information for five networks [Online]. Available: http://hot.caltech.edu/topology/toynets.html.
Rocketfuel maps and data (2003). An ISP topology mapping engine [Online]. Available: http://www.cs.washington.edu/research/networking/rocketfuel.
Networks Software and Data (2009). Program for large network analysis [Online]. Available: http://vlado.fmf.uni-lj.si/pub/networks/pajek.
Alderson, D., Li, L., Willinger, W., & Doyle, J. (2005). Understanding internet topology: principles, models, and validation. IEEE/ACM Transactions on Networking, 13(6), 1205–1218.
Zhang, Y., Roughan, M., Lund, C., & Donoho, D. (2003). An information-theoretic approach to traffic matrix estimation. Proceedings of the ACM SIGCOMM, Computer Communication Review, 33, 301–312.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ghamry, W.K., Elsayed, K.M.F. Network design methods for mitigation of intentional attacks in scale-free networks. Telecommun Syst 49, 313–327 (2012). https://doi.org/10.1007/s11235-010-9375-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-010-9375-2