Abstract
To design a network that is robust under attacks, the first step is to define a robustness measure for evaluating the network response under attacks. Such a measure could be in different forms regarding different attacks. In the next, we first introduce several attack classifications: small-scale vs. large-scale attacks, physical vs. logical attacks, random vs. targeted attacks, and geographically concentrated vs. distributed attacks. Afterwards, we focus on a particular type of large-scale attacks, the area attacks, for which we investigate the appropriate robustness measure in this monograph.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Boesch FT, Harary F, Kabell JA (1981) Networks 11(1):57–63. doi:10.1002/net. 3230110106
Phillips CA (1993) In: Proceedings of ACM symposium on theory of computing, vol 25. ACM, New York, p 776. doi:10.1145/167088.167286
Wood RK (1993) Math Comput Model 17(2):1. doi:10.1016/0895-7177(93)90236-R
Bingol L (2001) A lagrangian heuristic for solving a network interdiction problem. Master’s thesis, Naval Postgraduate School
Royset JO, Wood RK (2008) INFORMS J Comput 19(2):175. doi:10.1287/ijoc.1060. 0191
Motter AE, Lai YC (2002) Phys Rev E 66(6):065102. doi:10.1103/PhysRevE.66. 065102
Sachtjen M, Carreras B, Lynch V (2000) Phys Rev E 61(5):4877. doi:10.1103/ PhysRevE.61.4877
Goh KI, Kahng B, Kim D (2002) Phys Rev Lett 88(10):108701. doi:10.1103/ PhysRevLett.88.108701
Watts D (2002) Proc Natl Acad Sci 99(9), 5766. doi:10.1073/pnas.082090499
Moreno Y, Gomez J, Pacheco A (2002) Europhys Lett 58(4):630. doi:10.1209/epl/ i2002-00442-2
Willinger W, Govindan R, Jamin S, Paxson V, Shenker S (2002) Proc Natl Acad Sci 99(1), 2573. doi:10.1073/pnas.012583099
Callaway DS, Newman MEJ, Strogatz SH, Watts DJ (2000) Phys Rev Lett 85:5468. doi:10.1103/PhysRevLett.85.5468
Ball F, Mollison D, Scalia-Tomba G (1997) Ann Appl Probab 7(1):46. doi:10.1214/ aoap/1034625252
Newman MEJ, Watts DJ (1999) Phys Rev E 60(6):7332. doi:10.1103/PhysRevE.60. 7332
Cohen R, Erez K, ben Avraham D, Havlin S (2000) Phys Rev Lett 85:4624. doi:10.1103/PhysRevLett.85.4626
Zhou Q, Gao L, Cui S (2010) In: Proceedings of IEEE GLOBECOM. IEEE, Piscataway, pp 368–372. doi:10.1109/GLOCOMW.2010.5700343
Foster JS, Gjelde E, Graham WR, Hermann RJ, Kluepfel HM, Lawson RL, Soper GK, Wood LL, Woodard JB (2004) Report of the commission to assess the threat to the united states from electromagnetic pulse (emp) attack. http://www.empcommission.org/docs/empctextunderscoreexectextunderscorerpt.pdf. Accessed 20 Apr 2012
Radasky W (2007) High-altitude electromagnetic pulse (hemp): a threat to our way of life. http://www.todaysengineer.org/2007/Sep/HEMP.asp. Accessed 20 Apr 2012
Ozdamar L, Ekinci E, Kucukyazici B (2004) Ann Oper Res 129:217. doi:10.1023/B: ANOR.0000030690.27939.39
Radwan AE, Hobeika AG, Sivasailam D (1985) Inst Transp Eng J 55(9):25
Young S, Balluz L, Malilay J (2004) Sci Total Environ 322:3. doi:10.1016/ S0048-9697(03)00446-7
Feng QS, Chen JF, Ai MY (2010) J Acta Petrolei Sinica 1:139
Wang JW, Rong LL (2009) Elsevier Saf Sci 47(10):1332. doi:10.1016/j.ssci.2009.02.002
Pastor-Satorras R, Vazquez A, Vespignani A (2001) Phys Rev Lett 87(25):258701. doi:10.1103/PhysRevLett.87.258701
Cohen R, Erez K, Ben-Avraham D, Havlin S (2001) Phys Rev Lett 86(16):3682. doi:10.1103/PhysRevLett.86.3682
Gligor VD (1984) Proc IEEE Trans Softw Eng 10(3), 320. doi:10.1109/TSE.1984. 5010241
Peng T, Leckie C, Ramamohanarao K (2007) ACM Comput Surv 39(1):1. doi:10. 1145/1216370.1216373
Mirkovic J, Reiher P (2004) ACM Comput Commun Rev 34(2):39. doi:10.1145/ 997150.997156
Burch H, Cheswick B (2000) In: Proceedings of the USENIX LISA. USENIX Association, Berkeley, pp 319–327
Savage S, Wetherall D, Karlin A, Anderson T (2000) ACM Comput Commun Rev 30(4):295. doi:10.1145/347057.347560
Snoeren AC, Partridge C, Sanchez LA, Jones CE, Tehakountio F, Kent ST, Strayer WT (2001) ACM Comput Commun Rev 31(4):3. doi:10.1145/964723.383060
Albert R, Jeong H, Barabasi AL (1999) Nature 6749:130
Barabasi AL, Albert R (1999) Science 286(5439):509
Barabasi AL, Albert R, Jeong H (2000) Phys A Stat Mech Appl 281(1–4):69. doi:10.1016/S0378-4371(00)00018-2
Faloutsos M, Faloutsos P, Faloutsos C (1999) Comput Commun Rev 29(4):251. doi:10.1145/316194.316229
Li W, Cai X (2004) Phys Rev E 69(4):046106. doi:10.1103/PhysRevE.69.046106
Albert R, Jeong H, Barabasi AL (2000) Nature 406(6794):378. doi:10.1038/35019019
Neumayer S, Zussman G, Cohen R, Modiano E (2009) In: Proceedings of IEEE INFOCOM. IEEE, Piscataway, pp 1566–1574. doi:10.1109/INFCOM.2009.5062074
Brown G, Carlyle WM, Salmeron J, Wood K (2005) Tutorials in operations research. INFORMS, Hanover, pp 102–123
Brown G, Carlyle M, Salmeron J, Wood K (2006) Informs 36(6):530. doi:10.1287/ inte.1060.0252
Kephart J, White S (1991) IEEE computer society symposium on research in security and privacy. IEEE, Los Alamitos, pp 343–359. doi:10.1109/RISP.1991.130801
Gallos LK, Cohen R, Argyrakis P, Bunde A, Havlin S (2005) Phys Rev Lett 94(18):188701. doi:10.1103/PhysRevLett.94.188701
Magoni D (2003) IEEE J Sel Areas Commun 21(6):949. doi:10.1109/JSAC.2003. 814364
Agarwal P, Efrat A, Ganjugunte S, Sankararaman S, Hay D, Zussman G (2011) In: Proceedings of IEEE INFOCOM. IEEE, New York, pp 1521–1529. doi:10.1109/ INFCOM.2011.5934942
Sen A, Banerjee S, Ghosh P, Shirazipourazad S (2009) In: Proceedings 47th annual allerton conference on communication, control, and computing. IEEE, Piscataway, pp 1430–1437. doi:10.1109/ALLERTON.2009.5394506
Liu J, Jiang X, Nishiyama H, Kato N (2011) IEEE Trans Veh Technol 60(5):2253. doi:10.1109/TVT.2011.2114684
Kim K, Venkatasabramanian N (2010) In: Proceedings of IEEE GLOBECOM. IEEE, Piscataway, pp 1–5. doi:10.1109/GLOCOM.2010.5685229
Neumayer S, Modiano E (2010) In: Proceedings of IEEE INFOCOM. IEEE, New York, pp 1–9. doi:10.1109/INFCOM.2010.5461984
Mathew P (2003) Random geometric graphs. Oxford University Press, Oxford
Schlick T (2002) Molecular modeling and simulation: an interdisciplinary guide. Springer, New York
Manna SS, Sen P (2002) Phys Rev E 66(3):066114. doi:10.1103/PhysRevE.66.066114
Ebel H, Mielsch L, Bornholdt S (2002) Phys Rev E 66:35103. doi:10.1103/PhysRevE. 66.035103
Meester R, Roy R (1996) Continuum percolation. Cambridge University Press, New York
Chung F, Lu L (2003) Internet Math 1(1):91. doi:10.1080/15427951.2004.10129081
Level 3 Communication Corp (2012) Level 3 communications network map. http://www.level3.com/en/resource-library/maps/level-3-network-map/. Accessed 20 Apr 2012
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2013 The Authors
About this chapter
Cite this chapter
Zhou, Q., Gao, L., Liu, R., Cui, S. (2013). Introduction. In: Network Robustness under Large-Scale Attacks. SpringerBriefs in Computer Science. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-4860-0_1
Download citation
DOI: https://doi.org/10.1007/978-1-4614-4860-0_1
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-4859-4
Online ISBN: 978-1-4614-4860-0
eBook Packages: Computer ScienceComputer Science (R0)