scholarly journals Maximization of Network Survivability under Malicious and Epidemic Attacks

Author(s):  
Frank Yeong-Sung Lin ◽  
Yu-Shun Wang ◽  
Hui-Yu Chung ◽  
Jia-Ling Pan
2012 ◽  
Vol 2012 ◽  
pp. 1-19 ◽  
Author(s):  
F. A. Kuipers

Network survivability—the ability to maintain operation when one or a few network components fail—is indispensable for present-day networks. In this paper, we characterize three main components in establishing network survivability for an existing network, namely, (1) determining network connectivity, (2) augmenting the network, and (3) finding disjoint paths. We present a concise overview of network survivability algorithms, where we focus on presenting a few polynomial-time algorithms that could be implemented by practitioners and give references to more involved algorithms.


2013 ◽  
Vol 2013 ◽  
pp. 1-9
Author(s):  
Pei-Yu Chen ◽  
Frank Yeong-Sung Lin

With more and more mobile device users, an increasingly important and critical issue is how to efficiently evaluate mobile network survivability. In this paper, a novel metric called Average Degree of Disconnectivity (Average DOD) is proposed, in which the concept of probability is calculated by the contest success function. The DOD metric is used to evaluate the damage degree of the network, where the larger the value of the Average DOD, the more the damage degree of the network. A multiround network attack-defense scenario as a mathematical model is used to support network operators to predict all the strategies both cyber attacker and network defender would likely take. In addition, the Average DOD would be used to evaluate the damage degree of the network. In each round, the attacker could use the attack resources to launch attacks on the nodes of the target network. Meanwhile, the network defender could reallocate its existing resources to recover compromised nodes and allocate defense resources to protect the survival nodes of the network. In the approach to solving this problem, the “gradient method” and “game theory” are adopted to find the optimal resource allocation strategies for both the cyber attacker and mobile network defender.


Sign in / Sign up

Export Citation Format

Share Document