Skip to main content
Log in

Network design methods for mitigation of intentional attacks in scale-free networks

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

Network robustness and network reliability are important issues in the design of Internet Service Providers’ topologies. In this paper, we examine the structural characteristics of network topologies that affect robustness and reliability. We examine the interplay between the structural characteristics of network topologies and the resource capacity over-provisioning strategies when the network breakdowns subject to practical constraints (router technology) and economic considerations (link costs). We study the robustness of the Internet connectivity under node intentional harmful attack using two attacks strategies: static degree-based and static load-based. We find that the robustness of network topologies is affected by the variation of their structural characteristics. In our proposed approach, we show that highly-heterogeneous topologies have less robustness compared with lightly-heterogeneous topologies. The observations from the robustness study provide us useful insights for proposing multiple efficient preventive resource capacity over-provisioning strategies for mitigation of intentional attacks. The proposed strategies utilize the structural properties by calculating the excess traffic in case of single global cascading failure for each node and measure its influence on the other nodes as well as locally. The results show that our proposed strategies can significantly enhance the robustness and increase the resilience of network topology. We also show that highly-heterogeneous topologies have high resilience compared with lightly-heterogeneous topologies. By using real data from the Sprint network at the router level, we provide further empirical evidence in support of the proposed approach.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Bornholdt, S., & Schuster, H. G. (Eds.) (2003). Handbook of graphs and networks: from the genome to the internet. New York-Weinheim: Wiley-VCH.

    Google Scholar 

  2. Govindan, R., & Tangmunarunkit, H. (2000). Heuristics for internet map discovery. In Proc. IEEE INFOCOM, Tel Aviv, Israel (pp. 1371–1380).

  3. Chang, H., Govindan, R., Jamin, S., Shenker, S., & Willinger, W. (2002). Toward capturing representative as-level internet topologies. In Proc. ACM SIGMETRICS, Marina Del Rey, CA, Jun. 2002 (pp. 280–281).

  4. Albert, R., Jeong, H., & Barabasi, A.-L. (2000). Error and attack tolerance of complex networks. Nature, 406, 378–382.

    Article  Google Scholar 

  5. Cohen, R., Erez, K., Ben-Avraham, D., & Halvin, S. (2001). Breakdown of the internet under intentional attack. Physical Review Letter, 86(16), 3682–3685.

    Article  Google Scholar 

  6. Crucitti, P., Latora, V., Marchiori, M., & Rapisarda, A. (2003). Error and attack tolerance of complex networks. Physica, A 320, 622.

    Google Scholar 

  7. Magoni, D. (2003). Tearing down the internet. IEEE Journal on Selected Areas in Communications, 21(6), 949–960.

    Article  Google Scholar 

  8. Doyle, J. C., Alderson, D. L., Li, L., Low, S., Roughan, M., Shalunov, S., Tanaka, R., & Willinger, W. (2005). The “robust yet fragile nature of the internet”. Proceedings of the National Academy of Sciences of the United States of America, 102(41), 14497–14502.

    Article  Google Scholar 

  9. Holme, P., & Kim, B.J. (2002). Vertex overload breakdown in evolving networks. Physical Review Letters, E 65, 026139.

    Google Scholar 

  10. Holme, P. (2002). Edge overload breakdown in evolving networks. Physical Review Letters, E 65, 066109.

    Google Scholar 

  11. Holme, P., Kim, B.J., Yoon, C.N., & Han, S.K. (2002). Attack vulnerability of complex networks. Physical Review, E 65, 056109.

    Google Scholar 

  12. Motter, A. E., & Lai, Y. (2002). Cascade-based attacks on complex networks. Phys. Rev., E 66, 065102(R).

    Google Scholar 

  13. Xiao, S., & Xiao, G. (2006). On intentional attacks and protections in complex communication networks. In Proc. IEEE Globecom’06, Nov.–Dec. 2006.

  14. Xiao, S., Xiao, G., & Cheng, T.H. (2008). Tolerance of intentional attacks in complex communication networks. IEEE Communications Magazine, 46(1), 146–152.

    Article  Google Scholar 

  15. Beygelzimer, A., Grinstein, G. M., Linsker, R., & Rish, I. (2005). Improving network robustness by edge modification. Physica, A 375(3–4), 593–612.

    Google Scholar 

  16. Xiao, S., Xiao, G., & Cheng, T.H. (2006). Robustness of complex communication networks under rewiring operations. In Proc. IEEE ICCS’06, Oct-Nov. 2006.

  17. Xiao, S., & Xiao, G. (2007). On local link repairing in complex communication networks under intentional attack. In Proc. ICICS, Dec. 2007.

  18. Wang, Y., Xiao, G., Cheng, T.H., Xiao, S., & Fu, X. (2008). Robustness of complex communication networks under link attacks. In Proc. ICAIT’08, July 2008.

  19. Albert, R., & Barabási, A. L. (2002). Statistical mechanics of complex networks. Reviews of Modern Physics, 74(1), 47–97.

    Article  Google Scholar 

  20. Chung, F., & Lu, L. (2003). The average distance in a random graph with given expected degrees. Internet Mathematics, 1, 91–113.

    Article  Google Scholar 

  21. Aiello, W., Chung, F., & Lu, L. (2000). A random graph model for massive graphs. In Proc. STOC 2000.

  22. Li, L., Alderson, D., Willinger, W., & Doyle, J. (2004). A first-principles approach to understanding the internet’s router-level topology. ACM SIGCOMM Computer Communication Review, 34(4), 3–14.

    Article  Google Scholar 

  23. Abilene Network (2004). Detailed information about the objectives, organization, and development of the Abilene network [Online]. Available: http://www.Internet2.edu/abilene.

  24. Li, L., Alderson, D., Willinger, W., & Doyle, J. (2004). Topology information for five networks [Online]. Available: http://hot.caltech.edu/topology/toynets.html.

  25. Rocketfuel maps and data (2003). An ISP topology mapping engine [Online]. Available: http://www.cs.washington.edu/research/networking/rocketfuel.

  26. Networks Software and Data (2009). Program for large network analysis [Online]. Available: http://vlado.fmf.uni-lj.si/pub/networks/pajek.

  27. Alderson, D., Li, L., Willinger, W., & Doyle, J. (2005). Understanding internet topology: principles, models, and validation. IEEE/ACM Transactions on Networking, 13(6), 1205–1218.

    Article  Google Scholar 

  28. Zhang, Y., Roughan, M., Lund, C., & Donoho, D. (2003). An information-theoretic approach to traffic matrix estimation. Proceedings of the ACM SIGCOMM, Computer Communication Review, 33, 301–312.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Khaled M. F. Elsayed.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Ghamry, W.K., Elsayed, K.M.F. Network design methods for mitigation of intentional attacks in scale-free networks. Telecommun Syst 49, 313–327 (2012). https://doi.org/10.1007/s11235-010-9375-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-010-9375-2

Keywords

Navigation