ebook img

The Hayastan Shakarian cut: measuring the impact of network disconnections PDF

0.47 MB·
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview The Hayastan Shakarian cut: measuring the impact of network disconnections

The Hayastan Shakarian cut: measuring the impact of network disconnections Ivana Bachmann∗, Patricio Reyes†, Alonso Silva‡, Javier Bustos-Jime´nez∗ ∗NICLabs, Computer Science Department (DCC), Universidad de Chile. Emails: {ivana,jbustos}@niclabs.cl †Technological Institute for Industrial Mathematics (ITMATI), Santiago de Compostela, Spain. Email: [email protected] ‡Bell Labs, Alcatel-Lucent, Centre de Villarceaux, Nozay, France. Email: [email protected] Abstract—In this article we present the Hayastan Shakarian of the larger connected component after removing a network 6 (HS),arobustnessindexforcomplexnetworks.HSmeasuresthe edge. Then, we plan a greedy strategy called the Hasyastan 1 impact of a network disconnection (edge) while comparing the Shakariancut(HSc),whichistoremovetheedgewithhigher 0 sizes of the remaining connected components. Strictly speaking, HS value, aiming to partition the network in same-sized 2 the Hayastan Shakarian index is defined as edge removal that producesthemaximalinverseofthesizeofthelargestconnected connected components, and recalculating the network HSs n componentdividedbythesumofthesizesoftheremainingones. after each cut. We discuss the performance of attacks based a We tested our index in attack strategies where the nodes on the Hayastan Shakarian cut and the edge betweenness J are disconnected in decreasing order of a specified metric. We centrality metric [3], compared by the robustness index (R- 1 considered using the Hayastan Shakarian cut (disconnecting the 1 edge with max HS) and other well-known strategies as the index). Our main conclusion is that the first strikes of the higher betweenness centrality disconnection. All strategies were strategy the Hayastan Shakarian cut strategy causes more ] compared regarding the behavior of the robustness (R-index) “damage” than the classical betweenness centrality metric in I S during the attacks. In an attempt to simulate the internet terms of network disconnection (R-index). . backbone,theattackswereperformedincomplexnetworkswith The article is organized as follows, next section presents s power-law degree distributions (scale-free networks). c related work, followed by the definition of the Hayastan Preliminary results show that attacks based on disconnecting [ usingtheHayastanShakariancutaremoredangerous(decreasing Shakarian cut, its attacking strategy, and its simulation results 1 the robustness) than the same attacks based on other centrality in Section III. Conclusions are presented in Section IV. v measures. 5 We believe that the Hayastan Shakarian cut, as well as other II. RELATEDWORK 6 measures based on the size of the largest connected component, Over the last decade, there has been a huge interest in the 4 providesagoodadditiontootherrobustnessmetricsforcomplex 2 networks. analysis of complex networks and their connectivity prop- 0 erties [2]. During the last years, networks and in particular . I. INTRODUCTION social networks have gained significant popularity. An in- 1 0 Networks are present in human life in multiple forms from depth understanding of the graph structure is key to convert 6 socialnetworkstocommunicationnetworks(suchastheInter- data into information. To do so, complex networks tools have 1 net), and they have been widely studied as complex networks emerged[1]toclassifynetworks[21],detectcommunities[8], : v ofnodesandrelationships,describingtheirstructure,relations, determine important features and measure them [3]. i etc. Nowadays, studies go deep into network knowledge, and Concerning robustness metrics, betweenness centrality de- X using standard network metrics such as degree distribution servesspecialattention.Betweennesscentralityisametricthat r a and diameter one can determine how robust and/or resilient determines the importance of an edge by looking at the paths a network is. between all of the pairs of remaining nodes. Betweenness has Even though both terms (robustness and resilience) have been studied as a resilience metric for the routing layer [16] beenusedwiththesamemeaning,wewillconsiderrobustness and also as a robustness metric for complex networks [6] as the network inner capacity to resist failures, and resilience and for internet autonomous systems networks [9] among astheabilityofanetworktoresistandrecoveraftersuchfail- others. Betweenness centrality has been widely studied and ures. However, both terms have in common the methodology standardizedasacomparisonbaseforrobustnessmetrics,thus for testing robustness and/or resilience. Usually, they consist in this study it will be used for performance comparison. on planned attacks against nodes failures or disconnections, Another interesting edge-based metrics are: the increase of from a random set of failures to more elaborated strategies distances in a network caused by the deletion of vertices and using well known network metrics. edges [7]; the mean connectivity [19], that is, the probability Weconsiderthatan“adversary”shouldplanagreedystrat- that a network is disconnected by the random deletion of egy aiming to maximize damage with the minimum number edges; the average connected distance (the average length of of strikes. We present a new network impact metric called the shortest paths between connected pairs of nodes in the the Hayastan Shakarian index (HS), which reflects the size network) and the fragmentation (the decay of a network in terms of the size of its connected components after random component) with the other remaining sub-networks. HS N edge disconnections) [2]; the balance-cut resilience, that is, takesvaluesbetween0(thewholenetworkremainsconnected) the capacity of a minimum cut such that the two resulting to N −1 (the whole network is disconnected). vertex sets contain approximately the same number (similar Then, we define that the Hayastan Shakarian cut as the to the HS-index but aiming to divide the network only in onethatdisconnectsthenodewiththehighestHS-index value halves [20], not in equal sized connected components); the (when there is more than one, we choose it at random). That effective diameter (“the smallest h such that the number of is: pairs within a h-neighborhood is at least r times the total HSc=N \eˆ,where eˆ=max(HS (e)) ∀ e∈N number of reachable pairs” [11]); and the Dynamic Network N Robustness (DYNER) [15], where a backup path between nodes after a node disconnection and its length is used as a robustness metric in communication networks. The idea of planning a “network attack” using centrality measures has captured the attention of researchers and prac- titioners nowadays. For instance, Sterbenz et al. [17] used betweenness-centrality (bcen) for planning a network attack, calculating the bcen value for all nodes, ordering nodes from higher to lower bcen, and then attacking (discarding) those nodes in that order. They have shown that disconnecting only twoofthetopbcen-rankednodes,theirpacket-deliveryratiois reducedto60%,whichcorrespondsto20%moredamagethan other attacks such as random links or nodes disconnections, tracked by link-centrality and by node degrees. (a) Originalnetwork A similar approach and results were presented by C¸etin- kaya et al. [4]. They show that after disconnecting only 10 nodes in a network of 100+ nodes the packet-delivery ratio is reduced to 0%. Another approach, presented as an improved network attack [12], [18], is to recalculate the betweenness- centrality after the removal of each node [5], [10]. They show a similar impact of non-recalculating strategies but discarding sometimes only half of the equivalent nodes. In the study of resilience after edge removing, Rosenkratz et al. [13] study backup communication paths for network services defining that a network is “k-edge-failure-resilient if (b) HSremoving (c) BCremoving nomatterwhichsubsetofkorfeweredgesfails,eachresulting subnetworkisself-sufficient”giventhat“theedgeresilienceof Fig.1. Effectsofremovingedgesby(b)itsmaximalHS,and(c)itsmaximal a network is the largest integer k such that the network is k- betweennesscentralityvalue. edge-failure-resilient”. Forabetterunderstandingofnetworkattacksandstrategies, A. Network Attack Plan see [5], [10], [12], [18]. If we plan a network attack by disconnecting nodes with a III. THEHAYASTANSHAKARIANCUT givenstrategy(e.g.Figure1),itiswidelyacceptedtocompare itagainsttheuseofbetweennesscentralitymetric,becausethe Given a network N of size N, we denote by C(N \e) the latter reflects the importance of an edge in the network [6]. setofconnectedcomponentsinN afterdisconnectingedgee. These attack strategies are compared by means of the Unique The Hayastan Shakarian index (HS-index) for an edge e in Robustness Measure (R-index) [14], defined as: N is defined as follows: HSN(e)= m(cid:80)axcc∈∈CC((NN\\ee))(cid:107)(cid:107)cc(cid:107)(cid:107) −1,if(cid:107)C(N\e)(cid:107)(cid:54)=(cid:107)C(N)(cid:107) (1) R= N1 Q(cid:88)N=1s(Q), (2)  0 otherwise where N is the number of nodes in the network and s(Q) where (cid:107)c(cid:107), with c ∈ C(N \e), is the size of the connected is the fraction of nodes in the largest connected component component c of the network N after disconnecting edge e. after disconnecting (remove the edges among connected Notice that HS (e) reflects the partition of a network in components) Q nodes using a given strategy. Therefore, the N severalsub-networksafterthedisconnectionofedgeeandhow higher the R-index, the better in terms of robustness. Our these sub-networks remain interconnected. Strictly speaking, strategy is: it compares in size the core network (the largest connected In each step, (re)compute the HS index for all the edges, strategy during the first strikes. It achieves the disconnection and perform the Hayastan Shakarian cut. ofmorethanaquarterofthenetworkonlyafter200strikesfor α=2.10 and after 150 strikes for α=2.05 (see Figure 2). It isimportanttonoticethatthegreaterthevalueofα thelower B. Simulations the number of strikes needed by the Hayastan Shakarian cut In an attempt to study the behavior of the internet back- for reducing the original network to a connected component bone, we test our strategy in simulated power-law degree of 0.75 of the original size. distributionswithexponentsα∈{1.90,2.00,2.05,2.10,2.20} C. Revisiting the Hayastan Shakarian cut using Gephi. A power-law distribution is one that can be approximated by the function f(x) = k∗x−α, where k and Concerningtheattackingstrategies,itisimportanttonotice α are constants. For each α, we simulate 50 networks of size that the Hayastan Shakarian cut was designed for disconnect- 1000 (i.e., with 1000 nodes). Then, we tested and compared ing the network from the first strikes, aiming to get connected strategies ranked in terms of the R-index. components with similar sizes. This is the main reason of Instead of just comparing the robustness, after the removal its better performance compared to the betweenness centrality of all of the nodes, we studied the behavior of the attacks metricinaworst-attackscenario.Forinstance,inFigure2we after only a few strikes. To do so, we define a variant of the present examples where the HS cut performs better attacks R-indexwhichtakesintoaccountonlythefirstnstrikesofan than an strategy using the betweenness centrality metric for attack. Thus, for a simultaneous attack (where the nodes are different values of α. Notice that the Hayastan Shakarian cut ranked by a metric only once at the beginning), the R -index performs better than the edge betweenness centrality strategy n is defined as: for values α < 2.1, disconnecting the former more than the n 1 (cid:88) half of the network in less strikes than the latter. R = s(Q). (3) n n Giventhatforahighcoefficient(ofthepowerlaw)thenet- Q=1 work would have a densely connected core with a few nodes, For a sequential attack, the order of node disconnection is andmanynodesofdegree1.InthiscaseaHayastanShakarian recomputed after each disconnection. Similar to the R-index, cutwillnotbeaseffectiveasanedgebetweennessattacksince notice that the lower the R -index, the more effective the theHS-indexofthenodesinthecoreisprobably0(becauseis n attack is, since that gives us a higher reduction of robustness. highly connected), performing a Hayastan Shakarian cut over ResultsareshowninFigure2.Wetestedsequentialattacks: those edges attached to nodes of degree 1. Ateachstrike,thenextnodetodisconnectwastheonewiththe On the other hand, for a low coefficient (of the power law) highest metric (whether it be HSc or betweenness centrality) the proportion of high degree nodes and low degree nodes is in the current network. The figure shows the behavior of the more similar than those of a high coefficient, this means the R -indexin50scale-freenetworks(generatedasbefore)with network is well connected even if it is not densely connected. n exponent 1.9 to 2.2. The Hayastan Shakarian cut proves to In this case the Hayastan Shakarian cut will not cause that be very effective in attacks with only a few disconnections. much damage (because the network is well connected) but it Moreover, it shows that the effectiveness persists over the stillcausesmoredamagethanedgebetweenness,becauseedge number of strikes in scale-free networks with lower exponent. betweennesschoosestheedgeswithhightraffic,andsincethe It is interesting to note that, no matter the metric used, network is well connected it has many paths between any two the damage decreases in the long term with the number of nodes.InsteadtheHayastanShakariancut willkeepchoosing strikes. Revisiting the definition of network robustness, that the edges that causes more nodes to be disconnected. is, “a measure of the decrease of network functionality under Betweenness “generates” weak points by removing the a sinister attack”[5], it is important to notice that R-index edgeswithhightrafficuntiltherearenomorealternativepaths is a metric for a general view of robustness, and it gives between 2 nodes. On the other hand the Hayastan Shakarian no information of how fast the network is disconnected. We cut finds weak points that are already on the network (before suggestthatweightedversionsoftheR-indexcouldbeagood removing a single edge, see Figure: 1). Therefore, the Hayas- compromise.ThisisthecaseoftheR -indexproposedabove tan Shakarian cut will not produce a network necessarily n which takes into account the removal of only a percentage weaker, but a more fragmented and with stronger fragments. of the best ranked nodes (or until the network reaches its It is important to notice that there is a breaking point percolation threshold [5]) could be a more useful metric for where Hayastan Shakarian cut is no longer the best attacking robustness and/or resilience in worst-case scenarios. strategy. As shown in Figure 2, this breaking point appears Westartanalyzingwhatwouldbetheworst“attack”.Inthe after the largest connected component is less than 1/4 of worst case, a “malicious adversary” will try to perform the the original network. While an edge betweenness attack starts maximum damage with the minimum number of strikes, that attacking the edges in the core with high traffic, this will not is, with the minimum number of node disconnections (made produce loss of nodes in the beginning but after a number of by the attacker). edge removals, making the network weak and vulnerable to In terms of decreasing the size of the largest connected the point where a single additional edge removal may greatly component, the Hayastan Shakarian cut is the best attack reduce the fractional size of the largest component, in our (a) α=1.9 (b) α=2.0 (c) α=2.05 (d) α=2.1 (e) α=2.2 Fig.2. Sizeofthelargestfractionalconnectedcomponent(Y-axis)vs.numberofdisconnectededges(X-axis)usingasstrategiestheHayastanShakarian cut(blue)andedgebetweennesscentrality(red). examples, of around 0.1. After the breaking point and for the [3] N.I.Bersano-Me´ndez,S.E.Schaeffer,andJ.Bustos-Jime´nez. Metrics same number of edges removed by the Hayastan Shakarian and models for social networks. In Computational Social Networks, pages115–142.Springer,2012. cut the fractional size of the largest component will be higher [4] E. K. C¸etinkaya, D. Broyles, A. Dandekar, S. Srinivasan, and J. P. than the one produced by a edge betweenness attack. Sterbenz. Modelling communication network challenges for future Another interesting property of HS-index occurs when internetresilience,survivability,anddisruptiontolerance:Asimulation- basedapproach. TelecommunicationSystems,52(2):751–766,2013. max(HS (e)) = 0. In other words, when the Hayastan N [5] P.Holme,B.J.Kim,C.N.Yoon,andS.K.Han. Attackvulnerability Shakarian index is 0 for any node. In that case, the full ofcomplexnetworks. PhysicalReviewE,65(5):056109,2002. network will remain connected no matter which edge is [6] S.Iyer,T.Killingback,B.Sundaram,andZ.Wang. Attackrobustness andcentralityofcomplexnetworks. PloSone,8(4):e59613,2013. disconnected. Therefore, we suggest a resilience metric as [7] V. Krishnamoorthy, K. Thulasiraman, and M. Swamy. Incremental the number (or percentage) of disconnected nodes until distanceanddiametersequencesofagraph:newmeasuresofnetwork max(HS (e))>0, a pre-defined threshold, or the percolation performance. Computers,IEEETransactionson,39(2):230–237,1990. N [8] J.Leskovec,K.J.Lang,A.Dasgupta,andM.W.Mahoney. Statistical threshold [5]. properties of community structure in large social and information networks. Proceeding of the 17th international conference on World IV. CONCLUSIONSANDFUTUREWORK WideWeb-WWW’08,page695,2008. In this article we have presented the Hayastan Shakarian [9] P.Mahadevan,D.Krioukov,M.Fomenkov,X.Dimitropoulos,A.Vah- dat, et al. The internet as-level topology: three data sources and one cut (HSc), a robustness index for complex networks defined definitive metric. ACM SIGCOMM Computer Communication Review, as the inverse of the size of the remaining largest connected 36(1):17–26,2006. component divided by the sum of the sizes of the remaining [10] W.MoliszandJ.Rak.End-to-endservicesurvivabilityunderattackson networks. JournalofTelecommunicationsandInformationTechnology, connected components. pages19–26,2006. We tested our index as a measure to quantify the impact [11] C. R. Palmer, G. Siganos, M. Faloutsos, and C. Faloutsos. The of node removal in terms of the network robustness metric connectivity and fault-tolerance of the internet topology. In Workshop on Network-Related Data Management (NRDM 2001), In cooperation R-index. We compared HSc with other attacks based on well- withACMSIGMOD/PODS,2001. known centrality measures (betweenness centrality) for node [12] J. Rak and K. Walkowiak. Survivability of anycast and unicast flows removal selection. The attack strategy used was sequential under attacks on networks. In Ultra Modern Telecommunications and ControlSystemsandWorkshops(ICUMT),2010InternationalCongress targeted attack, where every index is recalculated after each on,pages497–503.IEEE,2010. removal,andthehighestoneisselectedforthenextextraction. [13] D.J.Rosenkrantz,S.Goel,S.Ravi,andJ.Gangolly.Resiliencemetrics Preliminary results show that the Hayastan Shakarian cut for service-oriented networks: A service allocation approach. Services Computing,IEEETransactionson,2(3):183–196,2009. performs better compared to a betweenness centrality-based [14] C. M. Schneider, A. A. Moreira, J. S. Andrade, S. Havlin, and H. J. attack in terms of decreasing the network robustness in the Herrmann. Mitigation of malicious attacks on networks. Proceedings worst-attack scenario (disconnecting more than the half of the oftheNationalAcademyofSciences,108(10):3838–3841,2011. [15] Y. Singer. Dynamic measure of network robustness. In Electrical and network)forvaluesofα<2.1.WesuggestthattheHayastan electronicsengineersinisrael,2006ieee24thconventionof,pages366– Shakarian cut, as well as other measures based on the size of 370.IEEE,2006. the largest connected component, provides a good addition to [16] P. Smith, D. Hutchison, J. P. Sterbenz, M. Scholler, A. Fessi, M. Kar- aliopoulos, C. Lac, and B. Plattner. Network resilience: a systematic other robustness metrics for complex networks. approach. CommunicationsMagazine,IEEE,49(7):88–97,2011. As future work, we can study improving through new [17] J.P.Sterbenz,E.K.Cetinkaya,M.Hameed,A.Jabbar,J.P.Rohrer,etal. connectionsanalreadyexistingnetworktomakeitmorerobust Modelling and analysis of network resilience. In Communication Sys- temsandNetworks(COMSNETS),2011ThirdInternationalConference toattacks,andwecanstudynetworksinwhichthetopological on,pages1–10.IEEE,2011. space is correlated with the cost of nodes disconnections, [18] A. Sydney, C. Scoglio, M. Youssef, and P. Schumm. Characterising nodes which are nearby have a lower cost to be disconnected the robustness of complex networks. International Journal of Internet TechnologyandSecuredTransactions,2(3-4):291–320,2010. compared with nodes which are far apart. [19] M. Tainiter. Statistical theory of connectivity i: Basic definitions and properties. DiscreteMathematics,13(4):391–398,1975. REFERENCES [20] H. Tangmunarunkit, R. Govindan, S. Jamin, S. Shenker, and W. Will- inger. Networktopologygenerators:Degree-basedvs.structural. ACM [1] R. Albert and A.-L. Baraba´si. Statistical mechanics of complex net- works. ReviewsofModernPhysics,74(1):47–97,Jan.2002. SIGCOMMComputerCommunicationReview,32(4):147–159,2002. [21] D. J. Watts and S. H. Strogatz. Collective dynamics of ’small-world’ [2] R. Albert, H. Jeong, and A. Barabasi. Error and attack tolerance of complexnetworks. Nature,406(6794):378–82,July2000. networks. Nature,393(6684):440–2,June1998.

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.