2019
DOI: 10.1109/tsmc.2018.2790438
|View full text |Cite
|
Sign up to set email alerts
|

Network Structural Vulnerability: A Multiobjective Attacker Perspective

Abstract: In this paper we provide a novel framework to assess the vulnerability/robustness of a network with respect to pairwise nodes' connectivity. In particular, we consider attackers that aim, at the same time, at dealing the maximum possible damage to the network in terms of the residual connectivity after the attack and at keeping the cost of the attack (e.g., the number of attacked nodes) at a minimum. Differently from previous literature, we consider the attacker perspective using a multiobjective formulation a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 26 publications
(12 citation statements)
references
References 44 publications
0
12
0
Order By: Relevance
“…In order to select fewer points for larger destruction to the graph, both the number of selected points and the pairwise connectivity in the remaining graph should be minimized. As a result, the critical node detection problem is also a subset selection MOP, and has been tackled by some MOEAs [40], [41].…”
Section: B Four Sparse Mops In Applicationsmentioning
confidence: 99%
“…In order to select fewer points for larger destruction to the graph, both the number of selected points and the pairwise connectivity in the remaining graph should be minimized. As a result, the critical node detection problem is also a subset selection MOP, and has been tackled by some MOEAs [40], [41].…”
Section: B Four Sparse Mops In Applicationsmentioning
confidence: 99%
“…Finally, assumptions about the attacker preferences are also required in the formulation presented in [10]. In general, centrality measures, such as the node degree or betweenness centrality are often adopted as criticality measures, while in [11] the authors propose a critical index for the elements of a CI by analyzing the solutions of a multi objective optimization problem without any assumption about the attacker behaviour. However, the adoption of a unique metric or indicator about the criticality rate of each node of the system is quite unrealistic due to the complex nature of the infrastructures.…”
Section: Related Workmentioning
confidence: 99%
“…In literature, graph centrality measures are often adopted as criticality measures for infrastructure but these approaches (e.g. Node degree or node betweenness) are quite ineffective as proved in [11]. In the second stage (Section 3) a methodology to merge multiple criticality metrics, based on the well-known Analytic Hierarchy Process [14], is described in order to overcome the limit about the application of a single metric in a complex environment.…”
Section: Contribution and Outline Of The Chaptermentioning
confidence: 99%
See 1 more Smart Citation
“…This is particularly relevant for critical infrastructure networks (e.g., power networks, railway networks, etc. ), where the importance/criticality of a subsystem may not depend just on the physical characteristics of such subsystems, but also on the complex web of connections and relations that intertwine such composing elements [4,5]. Assessing critical infrastructure vulnerabilities is paramount to arrange efficient plans for their protection.…”
Section: Introductionmentioning
confidence: 99%