Network vulnerability in two-phase evolution

N. A. Kinash, A. I. Trufanov, A. A. Tikhomirov, O. G. Berestneva, O. N. Fisochenko

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Contrary to traditional evolutionary models of complex networks a novel consideration with two-formation & degradation - phases has been proposed. To clarify which of the stages of the phases are more sensible the evolving network has been put to simulated attacks. A novel integral vulnerability metrics has been proposed which demonstrated strong dependence on the network growth rate of the stage put under short time attacks. It was found that the higher the rate is the higher pertinent vulnerability is observed. The study gives a dynamic scope for future analysis of network security, hints to build resilient network systems, and ways to perform network management effectively.

Original languageEnglish
Title of host publication2016 International Siberian Conference on Control and Communications, SIBCON 2016 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781467383837
DOIs
Publication statusPublished - 14 Jun 2016
Event2016 International Siberian Conference on Control and Communications, SIBCON 2016 - Moscow, Russian Federation
Duration: 12 May 201614 May 2016

Other

Other2016 International Siberian Conference on Control and Communications, SIBCON 2016
CountryRussian Federation
CityMoscow
Period12.5.1614.5.16

Fingerprint

Network security
Network management
Complex networks
Vulnerability
Degradation
Attack
Network Security
Network Management
Complex Networks
Metric
Model

Keywords

  • dynamic complex networks
  • vulnerability metrics

ASJC Scopus subject areas

  • Signal Processing
  • Control and Systems Engineering
  • Electrical and Electronic Engineering
  • Modelling and Simulation
  • Computer Networks and Communications

Cite this

Kinash, N. A., Trufanov, A. I., Tikhomirov, A. A., Berestneva, O. G., & Fisochenko, O. N. (2016). Network vulnerability in two-phase evolution. In 2016 International Siberian Conference on Control and Communications, SIBCON 2016 - Proceedings [7491785] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/SIBCON.2016.7491785

Network vulnerability in two-phase evolution. / Kinash, N. A.; Trufanov, A. I.; Tikhomirov, A. A.; Berestneva, O. G.; Fisochenko, O. N.

2016 International Siberian Conference on Control and Communications, SIBCON 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 2016. 7491785.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kinash, NA, Trufanov, AI, Tikhomirov, AA, Berestneva, OG & Fisochenko, ON 2016, Network vulnerability in two-phase evolution. in 2016 International Siberian Conference on Control and Communications, SIBCON 2016 - Proceedings., 7491785, Institute of Electrical and Electronics Engineers Inc., 2016 International Siberian Conference on Control and Communications, SIBCON 2016, Moscow, Russian Federation, 12.5.16. https://doi.org/10.1109/SIBCON.2016.7491785
Kinash NA, Trufanov AI, Tikhomirov AA, Berestneva OG, Fisochenko ON. Network vulnerability in two-phase evolution. In 2016 International Siberian Conference on Control and Communications, SIBCON 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc. 2016. 7491785 https://doi.org/10.1109/SIBCON.2016.7491785
Kinash, N. A. ; Trufanov, A. I. ; Tikhomirov, A. A. ; Berestneva, O. G. ; Fisochenko, O. N. / Network vulnerability in two-phase evolution. 2016 International Siberian Conference on Control and Communications, SIBCON 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 2016.
@inproceedings{f1ef186e88294db7a9beb021214eacfd,
title = "Network vulnerability in two-phase evolution",
abstract = "Contrary to traditional evolutionary models of complex networks a novel consideration with two-formation & degradation - phases has been proposed. To clarify which of the stages of the phases are more sensible the evolving network has been put to simulated attacks. A novel integral vulnerability metrics has been proposed which demonstrated strong dependence on the network growth rate of the stage put under short time attacks. It was found that the higher the rate is the higher pertinent vulnerability is observed. The study gives a dynamic scope for future analysis of network security, hints to build resilient network systems, and ways to perform network management effectively.",
keywords = "dynamic complex networks, vulnerability metrics",
author = "Kinash, {N. A.} and Trufanov, {A. I.} and Tikhomirov, {A. A.} and Berestneva, {O. G.} and Fisochenko, {O. N.}",
year = "2016",
month = "6",
day = "14",
doi = "10.1109/SIBCON.2016.7491785",
language = "English",
booktitle = "2016 International Siberian Conference on Control and Communications, SIBCON 2016 - Proceedings",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - GEN

T1 - Network vulnerability in two-phase evolution

AU - Kinash, N. A.

AU - Trufanov, A. I.

AU - Tikhomirov, A. A.

AU - Berestneva, O. G.

AU - Fisochenko, O. N.

PY - 2016/6/14

Y1 - 2016/6/14

N2 - Contrary to traditional evolutionary models of complex networks a novel consideration with two-formation & degradation - phases has been proposed. To clarify which of the stages of the phases are more sensible the evolving network has been put to simulated attacks. A novel integral vulnerability metrics has been proposed which demonstrated strong dependence on the network growth rate of the stage put under short time attacks. It was found that the higher the rate is the higher pertinent vulnerability is observed. The study gives a dynamic scope for future analysis of network security, hints to build resilient network systems, and ways to perform network management effectively.

AB - Contrary to traditional evolutionary models of complex networks a novel consideration with two-formation & degradation - phases has been proposed. To clarify which of the stages of the phases are more sensible the evolving network has been put to simulated attacks. A novel integral vulnerability metrics has been proposed which demonstrated strong dependence on the network growth rate of the stage put under short time attacks. It was found that the higher the rate is the higher pertinent vulnerability is observed. The study gives a dynamic scope for future analysis of network security, hints to build resilient network systems, and ways to perform network management effectively.

KW - dynamic complex networks

KW - vulnerability metrics

UR - http://www.scopus.com/inward/record.url?scp=84978121154&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84978121154&partnerID=8YFLogxK

U2 - 10.1109/SIBCON.2016.7491785

DO - 10.1109/SIBCON.2016.7491785

M3 - Conference contribution

AN - SCOPUS:84978121154

BT - 2016 International Siberian Conference on Control and Communications, SIBCON 2016 - Proceedings

PB - Institute of Electrical and Electronics Engineers Inc.

ER -