More Effective Centrality-Based Attacks on Weighted Networks

11/17/2022
by   Balume Mburano, et al.
0

Only when understanding hackers' tactics, can we thwart their attacks. With this spirit, this paper studies how hackers can effectively launch the so-called 'targeted node attacks', in which iterative attacks are staged on a network, and in each iteration the most important node is removed. In the existing attacks for weighted networks, the node importance is typically measured by the centralities related to shortest-path lengths, and the attack effectiveness is also measured mostly by length-related metrics. However, this paper argues that flows can better reflect network functioning than shortest-path lengths for those networks with carrying traffic as the main functionality. Thus, this paper proposes metrics based on flows for measuring the node importance and the attack effectiveness, respectively. Our node importance metrics include three flow-based centralities (flow betweenness, current-flow betweenness and current-flow closeness), which have not been proposed for use in the attacks on weighted networks yet. Our attack effectiveness metric is a new one proposed by us based on average network flow. Extensive experiments on both artificial and real-world networks show that the attack methods with our three suggested centralities are more effective than the existing attack methods when evaluated under our proposed attack effectiveness metric.

READ FULL TEXT
research
11/18/2018

Dynamic Flows with Adaptive Route Choice

We study dynamic network flows and introduce a notion of instantaneous d...
research
12/04/2018

Understanding Information Centrality Metric: A Simulation Approach

Identifying the central people in information flow networks is essential...
research
12/01/2020

Measuring Network Robustness by Average Network Flow

Infrastructure networks such as the Internet backbone and power grids ar...
research
08/22/2018

DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning

Flow correlation is the core technique used in a multitude of deanonymiz...
research
11/29/2017

Connectivity jamming game for physical layer attack in peer to peer networks

Because of the open access nature of wireless communications, wireless n...
research
12/10/2021

Flow Metrics on Graphs

Given a graph with non-negative edge weights, there are various ways to ...
research
05/19/2019

The Maestro Attack: Orchestrating Malicious Flows with BGP

We present the Maestro attack, a novel Link Flooding Attack (LFA) that l...

Please sign up or login with your details

Forgot password? Click here to reset