advisor : professor frank y. s. lin presented by: tuan-chun chen
DESCRIPTION
Decapitation of networks with and without weights and direction : The economics of iterated attack and defense. Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen Presentation date: Mar . 6, 2012. Agenda. Introduction Economic model Measurements Empirical work - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/1.jpg)
1
Decapitation of networks with and without weights and direction : The economics of iterated attack and defense
Advisor : Professor Frank Y. S. LinPresented by: Tuan-Chun ChenPresentation date: Mar. 6, 2012
![Page 2: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/2.jpg)
2
AgendaIntroductionEconomic model MeasurementsEmpirical workDiscussion of resultsConclusions
![Page 3: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/3.jpg)
3
AgendaIntroductionEconomic model MeasurementsEmpirical workDiscussion of resultsConclusions
![Page 4: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/4.jpg)
4
IntroductionMany empirically observed networks
can be modeled as scale-free networks. Ex: peer-to-peer networks
Scale-free networks are more robust against random attacks than targeted attacks.
![Page 5: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/5.jpg)
5
IntroductionBetweenness centrality can be an
alternative to degree for attack targeting.
A dynamic case : each round an attacker removes a certain number of nodes, but the defenders can recruit other nodes to replace the lost ones.
The smaller the largest connected component after an attack-defense round, the more successful is the attack.
![Page 6: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/6.jpg)
6
IntroductionTwo attacks were examined:
Removal of high-degree nodes
Path centrality attack -> Combine cliques with delegation is most
effective
-> Defense strategies(i) Radom replacement > less than 3 rounds(ii) Ring replacement > 3~12 rounds (iii) Clique replacement > robust
![Page 7: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/7.jpg)
7
IntroductionContribution and plan of this paper:
Extend the former research to consider weighted and directed networks and regards the economic aspects of the attack and defense strategies.
![Page 8: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/8.jpg)
8
IntroductionReasons to consider weights and
directions :Delegation strategies and the
computation of node centralities may depend on the weight of the links.
The distance between nodes may also be relevant to assess the impact of an attack on the LCC(Largest Connected Component).
![Page 9: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/9.jpg)
9
AgendaIntroductionEconomic model MeasurementsEmpirical workDiscussion of resultsConclusions
![Page 10: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/10.jpg)
10
Economic modelAttacks and their cost:
k The number of nodes destroyed in an attack
CFA Fixed cost incurred to locate the target nodes
CX Cost of destroying one node
( ) *A FA xC k C k C
![Page 11: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/11.jpg)
11
Economic modelLocating target nodes by measuring
criticality of nodes: ◦node degree◦node path centrality◦in the case of weighted :1
1
( ) :n
ijj
R i F
R(i) The reliability of a node IFij The weight of most reliable path between i
and j
![Page 12: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/12.jpg)
12
Economic modelDefenses and their cost
CFD Fixed cost of starting a defense roundCdel(h[, q])
Cost of implementing delegation for nodes with criticality δ higher than h
h Threshold criticalityq The clique size in case delegation is based
on cliquesCcli (q) Cost of replacing each destroyed nodes by
a clique consisting of q new nodes.
( , , ) ( [, ]) * ( )D FD del cliC h k q C C h q k C q
![Page 13: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/13.jpg)
13
Economic modelDelegation strategies and their cost
(i) Before attacks start(ii) Each time new edges are added to
the network due to the defense strategy of clique formation
![Page 14: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/14.jpg)
14
Economic model(i) Before attacks start
◦ Node criticality is measured as node degree.
◦ A node i with degree δ(i) > h attempts to transfer some of its edges to its neighbors.
![Page 15: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/15.jpg)
15
Economic model
![Page 16: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/16.jpg)
16
Economic model(i) Before attacks start
◦ Node criticality is measured as node degree.
◦ A node i with degree δ(i) > h attempts to transfer some of its edges to its neighbors.
◦ :1 , ( ) ( )
( )del ji i n i h j i
C h c
Δ(i) set of edges delegated by node icj cost of delegating the jth edge in Δ(i)
![Page 17: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/17.jpg)
17
Economic model(ii) New edges are added due to clique
formation◦ Node criticality is measured using path
centrality.◦ A node i with path centrality δ(i) > h is
replaced by a clique of size q.
![Page 18: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/18.jpg)
18
Economic model
![Page 19: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/19.jpg)
19
Economic model(ii) New edges are added due to clique
formation◦ Node criticality is measured using path
centrality.◦ A node i with path centrality δ(i) > h is
replaced by a clique of size q.
:1 , ( ) ( )
( , ) ( * )del n ji i n i h j i
C h q q C c
Cn Cost of new nodes forming the cliqueΔ(i) set of edges delegated by node icj cost of delegating the jth edge in Δ(i)
![Page 20: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/20.jpg)
20
Economic modelDefenses and their cost
BD Maximum budget of defender DCFD Fixed cost of starting a defense roundq The clique size in case delegation is based
on cliquesCdel(h[, q])
Cost of implementing delegation for nodes with criticality δ higher than h
Ccli (q) Cost of replacing each destroyed nodes by a clique consisting of q new nodes.
( , , ) ( [, ]) * ( )D FD del cliC h k q C C h q k C q
![Page 21: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/21.jpg)
21
Economic modelThe cost of clique replacement
◦ A destroyed node is replaced by clique of q nodes.
![Page 22: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/22.jpg)
22
Economic model
![Page 23: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/23.jpg)
23
Economic modelThe cost of clique replacement
◦ A destroyed node is replaced by clique of q nodes.
◦ ( )
( ) *cli n jj i
C q q C c
Cn Cost of new nodes forming the cliqueΔ(i) set of edges delegated by node icj cost of delegating the jth edge in Δ(i)
![Page 24: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/24.jpg)
24
AgendaIntroductionEconomic model MeasurementsEmpirical workDiscussion of resultsConclusions
![Page 25: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/25.jpg)
25
MeasurementsLCC(Largest Connected
Component)◦ The reduction in the network connectivity makes
communication impossible between some pairs of nodes.
◦ For the attacker: smaller LCC means more successful
APL(Average Path Length)◦ APL increase means communication is still possible,
but has become more difficult.◦ For the attacker: longer APL means more successful
![Page 26: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/26.jpg)
26
AgendaIntroductionEconomic model MeasurementsEmpirical workDiscussion of resultsConclusions
![Page 27: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/27.jpg)
27
Empirical workSFNG Matlab function which was
used to synthesize undirected scale-free network.
4 synthetic networks with 400 nodes each.
1 large real network which is a snapshot of the structure of the Internet at the level of autonomous system taken on July 22, 2006. Formed by 22,963 nodes.
![Page 28: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/28.jpg)
28
Empirical workPath centrality computation
◦Unweighted networks->Freeman’s betweenness centrality
◦Weighted networks ->as path centrality the reliability
measures
![Page 29: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/29.jpg)
29
Empirical workWeighted networksUndirected
Directed
11
( ) :n
ijj
R i F
11
( ) :n
jij
R i F
(in-reliability)
Fij The weight of most reliable path between i and j
![Page 30: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/30.jpg)
30
Empirical work
1 1min min log(1/ )i j i jp P p P w Wpij w Wp
wF w
maxij
p
ij p P w W
F w
=> Shortest path problem with nonnegative weights
=>
Pij Set of different paths between two nodes i and j
Wp Set of edge weights in path p
![Page 31: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/31.jpg)
31
Empirical workConsider attackers with several levels of
partial knowledge on the attacked network: 100%, 80%, 60%, 40%, 20%
Conduct 2 simulations(no defense, defense) with each of 4 initial network:
Each simulation consisted of 30 attack rounds.
1. unweighted undirected
3. weighted undirected
2. unweighted directed
4. weighted directed
![Page 32: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/32.jpg)
32
Empirical workFor the larger real Internet network,
conducted two additional, longer simulation.(with defense, without defense)
Each simulation consisted of 1722 attack rounds.
Simulation with defense: After a batch of q attack rounds, the defender was allowed to perform one defense round, which replaces the most critical node destroyed in the last q rounds by a clique of q nodes.
![Page 33: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/33.jpg)
33
Empirical workParameter choice for attack and
defense
◦ Threshold criticality h was set in a network-dependent way: only 5% of nodes had criticality δ > h.
◦ Clique size q was oriented by experiments. q = 5.
![Page 34: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/34.jpg)
34
AgendaIntroductionEconomic model MeasurementsEmpirical workDiscussion of resultsConclusions
![Page 35: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/35.jpg)
35
Discussion of results1. Unweighted undirected network
![Page 36: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/36.jpg)
36
Discussion of results2. Unweighted directed network
![Page 37: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/37.jpg)
37
Discussion of results3. Weighted undirected network
![Page 38: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/38.jpg)
38
Discussion of results4. Weighted directed network
![Page 39: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/39.jpg)
39
Discussion of results5. 22,963-node Internet snapshot
network
![Page 40: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/40.jpg)
40
AgendaIntroductionEconomic model MeasurementsEmpirical workDiscussion of resultsConclusions
![Page 41: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/41.jpg)
41
ConclusionsPrevious work in this area deals only
with un weighted undirected networks and does not clearly say how much attackers and defenders can do.
Weights may represent bandwidth, trust, distance, etc.
Attacks based on “node degree” or “path centrality”(taking weights into account).
Defenses consider “delegation” and “node replacement”.
![Page 42: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/42.jpg)
42
ConclusionsEmpirical results show that there are no
significant differences in the resistance of unweighted and weighted networks.
Directed networks were more connected and had more resistance than undirected networks.
Regardless of the network type, when the attacker knows only a 20% fraction of the network topology ,her attacks are not very harmful.
Directed networks which are scale-free can successfully withstand attacks where the attacker knows as much 80% or even 100% of the network topology.
![Page 43: Advisor : Professor Frank Y. S. Lin Presented by: Tuan-Chun Chen](https://reader035.vdocuments.net/reader035/viewer/2022081417/56816499550346895dd670e8/html5/thumbnails/43.jpg)
43
Thanks for your Attention!