Abstract
Complex systems experience dramatic changes in behavior and can undergo transitions from functional to dysfunctional states. An unstable system is prone to dysfunctional collective cascades that result from self-reinforcing behaviors within the system. Because many human and technological civilian and military systems today are complex systems, understanding their susceptibility to collective failure is a critical problem. Understanding vulnerability in complex systems requires an approach that characterizes the coupled behaviors at multiple scales of cascading failures. We used neuromorphic methods, which are modeled on the pattern-recognition circuitry of the brain and can find patterns in high-dimensional data at multiple scales, to develop a procedure for identifying the vulnerabilities of complex systems. This procedure was tested on microdynamic Internet2 network data. The result was a generic pipeline for identifying extreme events in high dimensional datasets.
Keywords
- Data Stream
- Extreme Event
- Kernel Principal Component Analysis
- Vulnerability Analysis
- Border Gateway Protocol
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, access via your institution.
Buying options
Preview
Unable to display preview. Download preview PDF.
References
B.G.P.: routing table analysis, http://thyme.apnic.net/ (modified August 2006)
BGPmon: Next generation BGP Monitor, http://bgpmon.netsec.colostate.edu/
Border gateway protocol (BGP) data collection standard communities, http://www.bgp4.as/bgp-data-collection-standard-communities (modified February 23, 2006)
New sources of BGP data, http://inl.info.ucl.ac.be/blogs/08-10-27-new-sources-bgp-data (modified October 28, 2008)
University of Oregon Route Views Project, http://www.routeviews.org/ (modified January 25, 2005)
Adam, C., Stadler, R.: Patterns for routing and self-stabilization. In: Proc IEEE/IFPS NOMS (2004)
Bar-Yam, Y.: Multiscale complexity/entropy. Advances in Complex Systems 7, 47–63
Bar-Yam, Y.: Multiscale variety in complex systems. Complexity 9(4), 37–45 (2004)
Bar-Yam, Y.: Dynamics of Complex Systems. Perseus Press, Cambridge (1997)
Barabási, A.L., de Menezes, M., Balensiefer, S., Brockman, J.: Hot spots and universality in network dynamics. The European Physical Journal B 38, 169–175 (2004)
Cowie, J., Ogielski, A., Premore, B., Yuan, Y.: Global routing instabilities triggered by Code Red II and Nimda worm attacks
Cowie, J., Ogielski, A., Premore, B., Yuan, Y.: Internet worms and global routing instabilities: scalability and traffic control in IP networks II. In: Proc SPIE, vol. 4868, pp. 195–199 (2002)
Cymru, T.: BGP monitoring, http://www.team-cymru.org/Monitoring/BGP/ (modified 2010)
Dolev, S.: Self-stabilization. MIT Press, Cambridge (2000)
Gheorghiu-Svirchevski, S., Bar-Yam, Y.: Multiscale analysis of information correlations in an infinite-range, ferromagnetic ising system. Phys. Rev. E 70(066115) (2004)
Hohn, N.: Measuring, understanding, and modelling internet traffic
Huberman, B., Lukose, R.: Social dilemmas and internet congestion. Science 277 (1997)
Internet2: http://www.internet2.edu
Izenman, A.: Modern Multivariate Statistical Techniques. Springer, Heidelberg (2008)
Coffman Jr., E.G., Ge, Z., Misra, V., Towsley, D.: Network resilience: exploring cascading failures within bgp. In: Proceedings of Allerton Conference on Communications, Computing, and Control (2001)
Labovitz, C., Malan, G., Jahanian, F.: Internet routing instability 6(5) (1998)
Lakhina, A., Crovella, M., Diot, C.: Mining anomalies using traffic feature distributions. BUCS (002) (2005)
M G.:
Mao, Z., Govindan, R., Varghese, G., Katz, R.: Route flap damping exacerbates internet routing convergence. In: Proceedings of ACM SIGCOMM, Pittsburgh, PA, USA, pp. 221–233 (2002)
de Menezes, M., Barabási, A.L.: Fluctuations in network dynamics. Phys. Rev. Lett. 92(028701) (2008)
Metzler, R., Bar-Yam, Y.: Multiscale analysis of correlated gaussians. Phys. Rev. E 71(046114), 2005 (2005)
Metzler, R., Bar-Yam, Y., Kardar, M.: Information flow through a chaotic channel: prediction and postdiction at finite resolution. Phys. Rev. E 70(020605) (2004)
Misra, V., Harmon, D., de Aguiar, M., Epstein, I., Braha, D., Bar-Yam, Y.: Vulnerability detection in complex systems. Unpublished report (2009)
Motter, A., Lai, Y.C.: Cascade-based attacks on complex networks. Phys. Rev. E 66(065102) (2002)
Nicol, D.: Challenges in using simulation to explain global routing instabilities. In: Conference on Grand Challenges in Simulation (2002)
Perlman, R.: Interconnections: Bridges, Routers, Switches and Internetworking Protocols, 2nd edn. Addison-Wesley Longman, Amsterdam (2001)
Valverde, S., Solé, R.: Internet’s critical path horizon. The European Physical Journal B 38(2) (2004)
Siganos, G., Faloutsos, M.: Detection of BGP routing misbehavior against cyber-terrorism. In: IEEE Military Communications Conference (2005)
Smith, R.: The dynamics of internet traffic: self-similarity, self-organization, and complex phenomena. ArXiV:0806.3374 (2008)
Wang, L., Zhao, X., Pei, D., Bush, R., Massey, D., Mankin, A., Wu, S., Zhang, L.: Observation and analysis of BGP behavior under stress. In: Proceedings of the 2nd ACM SIGCOMM workshop of internet measurement (2002)
Wang, Y.: Protecting mission critical networks. Seminar on Network Security Publications in Telecommunications Software and Multimedia (2001)
Yuan, J., Mills, K.: Macroscopic dynamics in large-scale data networks. Complex Dynamics in Communication Networks (2005)
Zou, C.C., Gong, W., Towsley, D.: Code red worm propagation modeling and analysis. In: Proceedings of the 9th ACM conference on Computer and communications security (2002)
Zou, C., Gao, L., Gong, W., Towsley, D.: Monitoring and early warning for internet worms. In: Proceedings of the 10th ACM conference on Computer and communications security (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Misra, V., Harmon, D., Bar-Yam, Y. (2010). Vulnerability Analysis of High Dimensional Complex Systems. In: Dolev, S., Cobb, J., Fischer, M., Yung, M. (eds) Stabilization, Safety, and Security of Distributed Systems. SSS 2010. Lecture Notes in Computer Science, vol 6366. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16023-3_43
Download citation
DOI: https://doi.org/10.1007/978-3-642-16023-3_43
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16022-6
Online ISBN: 978-3-642-16023-3
eBook Packages: Computer ScienceComputer Science (R0)