Skip to main content

Go-Index: Applying Supply Networks Principles as Internet Robustness Metrics

  • Conference paper
  • First Online:
Network Games, Control, and Optimization (NETGCOOP 2016)

Abstract

Whether as telecommunications or power systems, networks are very important in everyday life. Maintaining these networks properly functional and connected, even under attacks or failures, is of special concern. This topic has been previously studied with a whole network robustness perspective. With this perspective, whenever a node is removed the network behaviour is measured, and given a strategy all the nodes in the network are removed one by one. Then the final measure corresponds to the average of the measured behaviours after each node removal. Here, we propose two alternatives to well-known studies about the robustness of the backbone Internet: to use a supply network model and metrics for its representation (we called it the Go-Index) and to use robustness metrics that can be calculated as disconnections appear. Our research question is: if a smart adversary has a limited number of strikes to attack the Internet, how much will the damage be after each one in terms of network disconnection? Our findings suggest that in order to design robust networks it might be better to have a complete view of the robustness evolution of the network, from both the infrastructure and the user’s perspective.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    See the Forbes article at http://goo.gl/aHdeiN

  2. 2.

    See https://peering.google.com/#/options/peering

References

  1. Bachmann I, Reyes P, Silva A, Bustos-Jimenez J (2015) Miuz: measuring the impact of disconnecting a node. In: 2015 34th International Conference of the Chilean Computer Science Society (SCCC), pp 1–6, DOI 10.1109/SCCC.2015.7416586

    Google Scholar 

  2. Bersano-Méndez NI, Schaeffer SE, Bustos-Jiménez J (2012) Metrics and models for social networks. In: Computational Social Networks, Springer, pp 115–142

    Google Scholar 

  3. Booker LB (2012) The effects of observation errors on the attack vulnerability of complex networks. Tech. rep., DTIC Document

    Google Scholar 

  4. Buccirossi P, Ferrari Bravo L, Siciliani P (2005) Competition in the internet backbone market. World Competition 28(2):233–252

    Google Scholar 

  5. Calder M, Fan X, Hu Z, Katz-Bassett E, Heidemann J, Govindan R (2013) Mapping the expansion of google’s serving infrastructure. In: Proceedings of Internet Measurement Conference, ACM, pp 313–326

    Google Scholar 

  6. Chiu YC, Schlinker B, Radhakrishnan AB, Katz-Bassett E, Govindan R (2015) Are we one hop away from a better internet? In: Proceedings of Internet Measurement Conference, ACM, pp 523–529

    Google Scholar 

  7. Dhamdhere A, Dovrolis C (2010) The internet is flat: Modeling the transition from a transit hierarchy to a peering mesh. In: Proceedings of Co-NEXT, ACM, New York, NY, USA, pp 21:1–21:12, DOI 10.1145/1921168.1921196

    Google Scholar 

  8. Estrada E (2006) Network robustness to targeted attacks. the interplay of expansibility and degree distribution. The European Physical Journal B-Condensed Matter and Complex Systems 52(4):563–574

    Article  MathSciNet  MATH  Google Scholar 

  9. Gallos LK, Cohen R, Liljeros F, Argyrakis P, Bunde A, Havlin S (2006) Attack strategies on complex networks. In: Computational Science, Springer, pp 1048–1055

    Google Scholar 

  10. Holme P, Kim BJ, Yoon CN, Han SK (2002) Attack vulnerability of complex networks. Physical Review E 65(5):056,109

    Article  Google Scholar 

  11. Iyer S, Killingback T, Sundaram B, Wang Z (2013) Attack robustness and centrality of complex networks. PloS one 8(4):e59,613

    Article  Google Scholar 

  12. Jain S, Kumar A, Mandal S, Ong J, Poutievski L, Singh A, Venkata S, Wanderer J, Zhou J, Zhu M, et al (2013) B4: Experience with a globally-deployed software defined wan. ACM SIGCOMM Computer Communication Review 43(4):3–14

    Google Scholar 

  13. Labovitz C, Iekel-Johnson S, McPherson D, Oberheide J, Jahanian F (2011) Internet inter-domain traffic. ACM SIGCOMM Computer Communication Review 41(4):75–86

    Google Scholar 

  14. Mahadevan P, Krioukov D, Fomenkov M, Dimitropoulos X, Vahdat A, et al (2006) The internet as-level topology: three data sources and one definitive metric. ACM SIGCOMM Computer Communication Review 36(1):17–26

    Google Scholar 

  15. Molisz W, Rak J (2006) End-to-end service survivability under attacks on networks. Journal of Telecommunications and Information Technology pp 19–26

    Google Scholar 

  16. Rak J, Walkowiak K (2010) Survivability of anycast and unicast flows under attacks on networks. In: International Congress on Ultra Modern Telecommunications and Control Systems, IEEE, pp 497–503

    Google Scholar 

  17. Rosenkrantz DJ, Goel S, Ravi S, Gangolly J (2009) Resilience metrics for service-oriented networks: A service allocation approach. Services Computing, IEEE Transactions on 2(3):183–196

    Article  Google Scholar 

  18. Schneider CM, Moreira AA, Andrade JS, Havlin S, Herrmann HJ (2011) Mitigation of malicious attacks on networks. Proceedings of the National Academy of Sciences 108(10):3838–3841

    Article  Google Scholar 

  19. Smith P, Hutchison D, Sterbenz JP, Scholler M, Fessi A, Karaliopoulos M, Lac C, Plattner B (2011) Network resilience: a systematic approach. Communications Magazine, IEEE 49(7):88–97

    Article  Google Scholar 

  20. Sterbenz JP, Cetinkaya EK, Hameed M, Jabbar A, Rohrer JP, et al (2011) Modelling and analysis of network resilience. In: Third International Conference on Communication Systems and Networks, IEEE, pp 1–10

    Google Scholar 

  21. Sydney A, Scoglio C, Youssef M, Schumm P (2010) Characterising the robustness of complex networks. International Journal of Internet Technology and Secured Transactions 2(3–4):291–320

    Article  Google Scholar 

  22. Ventresca M, Aleman D (2015) Network robustness versus multi-strategy sequential attack. Journal of Complex Networks 3(1):126–146

    Article  MathSciNet  Google Scholar 

  23. Wu J, Deng HZ, Tan YJ, Zhu DZ (2007) Vulnerability of complex networks under intentional attack with incomplete information. Journal of Physics A: Mathematical and Theoretical 40(11):2665

    Article  MathSciNet  MATH  Google Scholar 

  24. Yehezkel A, Cohen R (2012) Degree-based attacks and defense strategies in complex networks. Physical Review E 86(6):066,114

    Article  Google Scholar 

  25. Zhao K, Kumar A, Yen J (2011) Achieving high robustness in supply distribution networks by rewiring. Engineering Management, IEEE Transactions on 58(2):347–362

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alonso Silva .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Bachmann, I., Morales, F., Silva, A., Bustos-Jimenez, J. (2017). Go-Index: Applying Supply Networks Principles as Internet Robustness Metrics. In: Lasaulce, S., Jimenez, T., Solan, E. (eds) Network Games, Control, and Optimization. NETGCOOP 2016. Static & Dynamic Game Theory: Foundations & Applications. Birkhäuser, Cham. https://doi.org/10.1007/978-3-319-51034-7_4

Download citation

Publish with us

Policies and ethics