Uncertainty in vulnerability of networks under attack.

Sci Rep

Department of Civil and Environmental Engineering, Northwestern University, 2145 Sheridan Road, Evanston, IL, 60208, USA.

Published: February 2023

AI Article Synopsis

  • The study investigates how different network structures respond to attacks, measuring both vulnerability and the uncertainty surrounding that vulnerability.
  • The research analyzes 16 network configurations, revealing which topologies are most and least susceptible to attacks and how uncertainty in vulnerability varies with network size and structure.
  • Key findings highlight that certain structures, like crossing paths and trees, are highly vulnerable, while complete grids experience the most uncertainty, underscoring the need for tailored security strategies based on network topology.

Article Abstract

This study builds conceptual explanations and empirical examinations of the vulnerability response of networks under attack. Two quantities of "vulnerability" and "uncertainty in vulnerability" are defined by scrutinizing the performance loss trajectory of networks experiencing attacks. Both vulnerability and uncertainty in vulnerability quantities are a function of the network topology and size. This is tested on 16 distinct topologies appearing in infrastructure, social, and biological networks with 8 to 26 nodes under two percolation scenarios exemplifying benign and malicious attacks. The findings imply (i) crossing path, tree, and diverging tail are the most vulnerable topologies, (ii) complete and matching pairs are the least vulnerable topologies, (iii) complete grid and complete topologies show the most uncertainty for vulnerability, and (iv) hub-and-spoke and double u exhibit the least uncertainty in vulnerability. The findings also imply that both vulnerability and uncertainty in vulnerability increase with an increase in the size of the network. It is argued that in networks with no undirected cycle and one undirected cycle, the uncertainty in vulnerability is maximal earlier in the percolation process. With an increase in the number of cycles, the uncertainty in vulnerability is accumulated at the end of the percolation process. This emphasizes the role of tailoring preparedness, response, and recovery phases for networks with different topologies when they might experience disruption.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC9947912PMC
http://dx.doi.org/10.1038/s41598-023-29899-wDOI Listing

Publication Analysis

Top Keywords

uncertainty vulnerability
28
vulnerability
9
networks attack
8
vulnerability uncertainty
8
vulnerable topologies
8
undirected cycle
8
percolation process
8
uncertainty
7
networks
6
topologies
5

Similar Publications

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!