Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
K-core-based attack to the Internet: Is it more malicious than degree-based attack?
Zhao J., Wu J., Chen M., Fang Z., Zhang X., Xu K. World Wide Web18 (3):749-766,2015.Type:Article
Date Reviewed: Nov 12 2015

Nobody can deny the importance of an Internet that has grown dramatically over the past few years. Nowadays, data has become a strategic asset for individuals and organizations alike; this means that even a partial failure of a small part of the Internet is no longer just an annoyance, but can have serious consequences for many people. This paper addresses the effects of such failures and then proposes a way to mitigate them.

Of course, the paper cannot take into account all the devices connected to the Internet, so it concentrates on AS-level nodes, or sets of Internet protocol (IP) addresses owned by large single administrative entities such as Internet service providers (ISPs). Each of these nodes has a degree, or how many other nodes it is linked to; nodes can be grouped in networks with a k-core index, which denotes the minimum degree among all nodes in the network. The main goal of the paper is to measure network robustness, or how well the network continues transmitting data while nodes go offline because of failures, either intentional or not, and are brought back online thanks to operator efforts. Up to this point, the paper tackles this topic in theory; now, it turns its attention to real-world data sets taken from the DIMES project (http://www.netdimes.org) and the UCLA AS-level topology archive (http://irl.cs.ucla.edu/topology). It simulates attacks on these data sets and finds that the higher the k-core index of a network, the less damage is caused by failures, because many paths are in any case left open; however, even three-to-six percent of nodes out of order are enough to crash the network. To counter this effect, the final part of the paper proposes ELL, a methodology to enhance the robustness of a network by adding more links between nodes of low degree.

I expose here the content of the paper in a narrative way for the sake of simplicity, but of course it presents the same topics, from k-core calculations to attack simulations to discussing results, in statistical and mathematical terms.

Reviewer:  Andrea Paramithiotti Review #: CR143941 (1601-0053)
Bookmark and Share
  Featured Reviewer  
 
Security and Protection (C.2.0 ... )
 
 
Internet (C.2.1 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Introduction to data security and controls (2nd ed.)
Edward R. I., QED Information Sciences, Inc., Wellesley, MA, 1991. Type: Book (9780894353864)
Aug 1 1992
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
Davies D., Price W., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471900634)
Oct 1 1985
The development and proof of a formal specification for a multilevel secure system
Glasgow J., Macewen G. ACM Transactions on Computer Systems 5(2): 151-184, 1987. Type: Article
Oct 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy