Nothing Special   »   [go: up one dir, main page]

skip to main content
article

On new approaches of assessing network vulnerability: hardness and approximation

Published: 01 April 2012 Publication History

Abstract

Society relies heavily on its networked physical infrastructure and information systems. Accurately assessing the vulnerability of these systems against disruptive events is vital for planning and risk management. Existing approaches to vulnerability assessments of large-scale systems mainly focus on investigating inhomogeneous properties of the underlying graph elements. These measures and the associated heuristic solutions are limited in evaluating the vulnerability of large-scale network topologies. Furthermore, these approaches often fail to provide performance guarantees of the proposed solutions. In this paper, we propose a vulnerability measure, pairwise connectivity, and use it to formulate network vulnerability assessment as a graph-theoretical optimization problem, referred to as β-disruptor. The objective is to identify the minimum set of critical network elements, namely nodes and edges, whose removal results in a specific degradation of the network global pairwise connectivity. We prove the NP-completeness and inapproximability of this problem and propose an O(log n log log n) pseudo-approximation algorithm to computing the set of critical nodes and an O(log1.5n) pseudo-approximation algorithm for computing the set of critical edges. The results of an extensive simulation-based experiment show the feasibility of our proposed vulnerability assessment framework and the efficiency of the proposed approximation algorithms in comparison to other approaches.

References

[1]
T. H. Grubesic, T. C. Matisziw, A. T.Murray, and D. Snediker, "Comparative approaches for assessing network vulnerability," Int. Regional Sci. Rev., vol. 31, no. 1, pp. 88-192, 2008.
[2]
R. Church, M. Scaparra, and R. Middleton, "Identifying critical infrastructure: The median and covering facility interdiction problems," Ann. Assoc. Amer. Geogr., vol. 94, no. 3, pp. 491-502, 2004.
[3]
A. Murray, T. Matisziw, and T. Grubesic, "Multimethodological approaches to network vulnerability analysis," Growth Change, vol. 39, no. 4, pp. 573-592, 2008.
[4]
A. Sen, S. Murthy, and S. Banerjee, "Region-based connectivity--A new paradigm for design of fault-tolerant networks," in Proc. HPSR, 2009, pp. 1-7.
[5]
S. Neumayer, G. Zussman, R. Cohen, and E. Modiano, "Assessing the vulnerability of the fiber infrastructure to disasters," in Proc. IEEE INFOCOM, 2009, pp. 1566-1574.
[6]
C. J. Colbourn, The Combinatorics of Network Reliability. New York: Oxford Univ. Press, 1987.
[7]
S. P. Borgatti and M. G. Everett, "A graph-theoretic perspective on centrality," Social Netw., vol. 28, no. 4, pp. 466-484, 2006.
[8]
D. Goyal and J. Caffery, "Partitioning avoidance in mobile ad hoc networks using network survivability concepts," in Proc. ISCC, 2002, p. 553.
[9]
M. Hauspie, J. Carle, and D. Simplot, "Partition detection in mobile ad hoc networks using multiple disjoint paths set," in Proc. Workshop Objects, Models Multimedia Technol., 2003, p. 15.
[10]
M. Jorgic, I. Stojmenovic, M. Hauspie, and D. Simplot-Ryl, "Localized algorithms for detection of critical nodes and links for connectivity in ad hoc networks," in Proc. 3rd IFIP MED-HOC-NET Workshop, 2004, pp. 360-371.
[11]
A. Barabasi, R. Albert, and H. Jeong, "Scale-free characteristics of random networks: The topology of the World-Wide Web," Physica A, vol. 281, pp. 69-77, 2000.
[12]
Y. J. Suh, D. J. Kim, W. S. Lim, and J. Y. Baek, "Method for supporting quality of service in heterogeneous networks," 2009.
[13]
T. Lehman, J. Sobieski, and B. Jabbari, "DRAGON: A framework for service provisioning in heterogeneous grid networks," IEEE Commun. Mag., vol. 44, no. 3, pp. 84-90, Mar. 2006.
[14]
V. Mhatre and C. Rosenberg, "Homogeneous vs heterogeneous clustered sensor networks: A comparative study," in Proc. IEEE ICC, 2004, vol. 6, pp. 3646-3651.
[15]
F. Sun and M. A. Shayman, "On pairwise connectivity of wireless multihop networks," Int. J. Security Netw., vol. 2, no. 1/2, pp. 37-49, 2007.
[16]
A. Arulselvan, C. W. Commander, L. Elefteriadou, and P. M. Pardalos, "Detecting critical nodes in sparse graphs," Comput. Oper. Res., vol. 36, no. 7, pp. 2193-2200, 2009.
[17]
S. P. Borgatti, "Identifying sets of key players in a social network," Comput. Math. Org. Theory, vol. 12, no. 1, pp. 21-34, 2006.
[18]
M. Stoer and F. Wagner, "A simple min-cut algorithm," J. ACM, vol. 44, no. 4, pp. 585-591, 1997.
[19]
D. Wagner and F. Wagner, "Between min cut and graph bisection," in Proc. MFCS, London, UK, 1993, pp. 744-750.
[20]
M. R. Garey and D. S. Johnson, Computers and Intractability; A Guide to the Theory of NP-Completeness. New York: Freeman, 1990.
[21]
I. Dinur and S. Safra, "On the hardness of approximating minimum vertex cover," Ann. Math., vol. 162, p. 2005, 2004.
[22]
A. Agarwal, M. Charikar, K. Makarychev, and Y. Makarychev, "O(log n) approximation algorithms for min uncut, min 2cnf deletion, and directed cut problems," in Proc. ACM STOC, New York, 2005, pp. 573-581.
[23]
G. Even, J. S. Naor, S. Rao, and B. Schieber, "Divide-and-conquer approximation algorithms via spreading metrics," J. ACM, vol. 47, no. 4, pp. 585-616, 2000.
[24]
R. Albert, H. Jeong, and A. Barabasi, "Error and attack tolerance of complex networks," Nature, vol. 406, no. 6794, pp. 378-382, Jul. 2000.
[25]
D. J. Watts and S. H. Strogatz, "Collective dynamics of 'small-world' networks," Nature, vol. 393, no. 6684, pp. 440-442, Jun. 1998.
[26]
L. Page, S. Brin, R. Motwani, and T.Winograd, "The Pagerank citation ranking: Bringing order to the Web," Stanford InfoLab, Stanford, CA, Tech. rep., 1999.

Cited By

View all
  • (2024)Xaminer: An Internet Cross-Layer Resilience Analysis ToolProceedings of the ACM on Measurement and Analysis of Computing Systems10.1145/36390428:1(1-37)Online publication date: 21-Feb-2024
  • (2024)An FPTAS for Connectivity InterdictionInteger Programming and Combinatorial Optimization10.1007/978-3-031-59835-7_16(210-223)Online publication date: 3-Jul-2024
  • (2023)Measures and Optimization for Robustness and Vulnerability in Disconnected NetworksIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.327997918(3350-3362)Online publication date: 1-Jan-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE/ACM Transactions on Networking
IEEE/ACM Transactions on Networking  Volume 20, Issue 2
April 2012
309 pages

Publisher

IEEE Press

Publication History

Published: 01 April 2012
Accepted: 04 August 2011
Revised: 06 May 2011
Received: 29 September 2010
Published in TON Volume 20, Issue 2

Author Tags

  1. approximation algorithm
  2. hardness
  3. network vulnerability
  4. pairwise connectivity

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 19 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Xaminer: An Internet Cross-Layer Resilience Analysis ToolProceedings of the ACM on Measurement and Analysis of Computing Systems10.1145/36390428:1(1-37)Online publication date: 21-Feb-2024
  • (2024)An FPTAS for Connectivity InterdictionInteger Programming and Combinatorial Optimization10.1007/978-3-031-59835-7_16(210-223)Online publication date: 3-Jul-2024
  • (2023)Measures and Optimization for Robustness and Vulnerability in Disconnected NetworksIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.327997918(3350-3362)Online publication date: 1-Jan-2023
  • (2021)Integer Programming Formulations for Minimum Spanning Tree InterdictionINFORMS Journal on Computing10.1287/ijoc.2020.101833:4(1461-1480)Online publication date: 1-Oct-2021
  • (2021)Measuring the Network Vulnerability Based on Markov CriticalityACM Transactions on Knowledge Discovery from Data10.1145/346439016:2(1-24)Online publication date: 21-Jul-2021
  • (2021)Minimizing Spectral Radius of Non-Backtracking Matrix by Edge RemovalProceedings of the 30th ACM International Conference on Information & Knowledge Management10.1145/3459637.3482274(2657-2667)Online publication date: 26-Oct-2021
  • (2021)Fast Connectivity Minimization on Large-Scale NetworksACM Transactions on Knowledge Discovery from Data10.1145/344234215:3(1-25)Online publication date: 3-May-2021
  • (2019)Finding Critical Links for Closeness CentralityINFORMS Journal on Computing10.1287/ijoc.2018.082931:2(367-389)Online publication date: 1-Apr-2019
  • (2018)Computing Critical Nodes in Directed GraphsACM Journal of Experimental Algorithmics10.1145/322833223(1-24)Online publication date: 18-Jul-2018
  • (2018)Solving the degree-concentrated fault-tolerant spanning subgraph problem by DC programmingMathematical Programming: Series A and B10.1007/s10107-018-1242-z169:1(255-275)Online publication date: 1-May-2018
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media