Author_Institution :
Dept. of Stat., Rutgers Univ., Piscataway, NJ
Abstract :
We propose measures of network vulnerability and study some of their properties. We define a network as a triplet (G,R,F), where G is the graph of the network, R is the routing protocol specifying how traffic flows on G, and F is the traffic load (typically random). Based on this structure, we calculate the expected loss of traffic from an "attack" which eliminates ttimes100% of the network\´s links. The result is a network vulnerability curve (NVC) measuring expected loss as a function of t,0lestles1. Clearly, different attack strategies (e.g., random versus malicious) could cause different levels of damages so, accordingly, we define four key NVCs: malicious, greedy, random, and Bernoulli, and study their mathematical properties. Some extensions are discussed
Keywords :
graph theory; routing protocols; telecommunication network reliability; telecommunication traffic; NVC measurement; network graph; network vulnerability curve; routing protocol; traffic flow; traffic load; Communication networks; Loss measurement; Network topology; Probability distribution; Routing protocols; Statistics; Telecommunication network reliability; Telecommunication traffic; Concavity; greedy attack; malicious attack; network; random attack; reliability; security; self similarity; vulnerability;