Skip to main content

2017 | OriginalPaper | Buchkapitel

A New Approach to Weakening and Destruction of Malicious Internet Networks

verfasst von : Mark Korenblit

Erschienen in: Advances in Soft Computing

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Models and algorithms for weakening and destruction of malicious complex internet networks are widely studied in AI in recent years. These algorithms must detect critical links and nodes in a dynamic network whose removals maximally destroy or spoil the network’s functions. In this paper we propose a new approach for solution of this problem. Instead of removal of corresponding key segments of networks we initiate intentional misrepresentation in important sites leading to wrong network evolution that in fact is equivalent to weakening/destruction of the network. Specifically, we cause and study artificial decentralization and artificial fragmentation in the network. For simulation of these phenomena, we apply and develop a network model based on nonuniform random recursive trees, so called one-max constant-probability network.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Arulselvan, A., Commander, C.W., Elefteriadou, L., Pardalos, P.M.: Detecting critical nodes in sparse graphs. Comput. Oper. Res. 36(7), 2193–2200 (2009)MathSciNetCrossRefMATH Arulselvan, A., Commander, C.W., Elefteriadou, L., Pardalos, P.M.: Detecting critical nodes in sparse graphs. Comput. Oper. Res. 36(7), 2193–2200 (2009)MathSciNetCrossRefMATH
3.
Zurück zum Zitat Dinh, T.N., Xuan, Y., Thai, M.T., Park, E.K., Znati, T.: On approximation of new optimization methods for assessing network vulnerability. In: INFOCOM 2010, Proceedings of the IEEE Browse Conference Publications, pp. 1–9, San Diego, CA, March 2010 Dinh, T.N., Xuan, Y., Thai, M.T., Park, E.K., Znati, T.: On approximation of new optimization methods for assessing network vulnerability. In: INFOCOM 2010, Proceedings of the IEEE Browse Conference Publications, pp. 1–9, San Diego, CA, March 2010
4.
Zurück zum Zitat Dinh, T.N., Xuan, Y., Thai, M.T., Pardalos, P.M., Znati, T.: On new approaches of assessing network vulnerability: hardness and approximation. IEEE/ACM Trans. Netw. 20(2), 609–619 (2012)CrossRef Dinh, T.N., Xuan, Y., Thai, M.T., Pardalos, P.M., Znati, T.: On new approaches of assessing network vulnerability: hardness and approximation. IEEE/ACM Trans. Netw. 20(2), 609–619 (2012)CrossRef
5.
Zurück zum Zitat Gustedt, J.: Generalized attachment models for the genesis of graphs with high clustering coefficient. In: Fortunato, S., Mangioni, G., Menezes, R., Nicosia, V. (eds.) Complex Networks. Studies in Computational Intelligence, vol. 207, pp. 99–113. Springer, Berlin (2009). doi:10.1007/978-3-642-01206-8_9 CrossRef Gustedt, J.: Generalized attachment models for the genesis of graphs with high clustering coefficient. In: Fortunato, S., Mangioni, G., Menezes, R., Nicosia, V. (eds.) Complex Networks. Studies in Computational Intelligence, vol. 207, pp. 99–113. Springer, Berlin (2009). doi:10.​1007/​978-3-642-01206-8_​9 CrossRef
7.
Zurück zum Zitat Korenblit, M., Talis, V., Levin, I.: One-max constant-probability models for complex networks. In: Contucci, P., Menezes, R., Omicini, A., Poncela-Casasnovas, J. (eds.) Complex Networks V. SCI, vol. 549, pp. 181–188. Springer, Cham (2014). doi:10.1007/978-3-319-05401-8_17 CrossRef Korenblit, M., Talis, V., Levin, I.: One-max constant-probability models for complex networks. In: Contucci, P., Menezes, R., Omicini, A., Poncela-Casasnovas, J. (eds.) Complex Networks V. SCI, vol. 549, pp. 181–188. Springer, Cham (2014). doi:10.​1007/​978-3-319-05401-8_​17 CrossRef
8.
Zurück zum Zitat Li, M., Gao, L., Zhou, W.: S-Kcore: a social-aware Kcore decomposition algorithm in pocket switched networks. In: IEEE/IFIP 2010: Proceedings of the IEEE/IFIP 8th International Conference Embedded and Ubiquitous Computing 2010, IEEE, Piscataway, N.J., pp. 737–742 Li, M., Gao, L., Zhou, W.: S-Kcore: a social-aware Kcore decomposition algorithm in pocket switched networks. In: IEEE/IFIP 2010: Proceedings of the IEEE/IFIP 8th International Conference Embedded and Ubiquitous Computing 2010, IEEE, Piscataway, N.J., pp. 737–742
9.
Zurück zum Zitat Molisz, W., Rar, J.: End-to-end service survivability under attacks on networks. J. Telecommun. Inform. Technol. 3, 19–26 (2006) Molisz, W., Rar, J.: End-to-end service survivability under attacks on networks. J. Telecommun. Inform. Technol. 3, 19–26 (2006)
10.
Zurück zum Zitat Peixoto, T.P., Bornholdt, S.: Evolution of robust network topologies: emergence of central backbones. Phys. Rev. Lett. 109, 118703 (2012)CrossRef Peixoto, T.P., Bornholdt, S.: Evolution of robust network topologies: emergence of central backbones. Phys. Rev. Lett. 109, 118703 (2012)CrossRef
11.
Zurück zum Zitat Shen, Y., Dinh, T.N., Thai, M.T.: Adaptive algorithms for detecting critical links and nodes in dynamic networks. In: 2012 IEEE Military Communications Conference Browse Conference Publications, MILCOM 2012, pp. 1–6, Orlando, FL, 29 October–1 November 2012 Shen, Y., Dinh, T.N., Thai, M.T.: Adaptive algorithms for detecting critical links and nodes in dynamic networks. In: 2012 IEEE Military Communications Conference Browse Conference Publications, MILCOM 2012, pp. 1–6, Orlando, FL, 29 October–1 November 2012
Metadaten
Titel
A New Approach to Weakening and Destruction of Malicious Internet Networks
verfasst von
Mark Korenblit
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-62428-0_37