• DocumentCode
    980323
  • Title

    Attack Vulnerability of Complex Communication Networks

  • Author

    Xia, Yongxiang ; Hill, David J.

  • Author_Institution
    Australian Nat. Univ., Canberra
  • Volume
    55
  • Issue
    1
  • fYear
    2008
  • Firstpage
    65
  • Lastpage
    69
  • Abstract
    The Internet has been studied as a typical example of real-world complex networks. In this brief, we study the traffic performance of the Internet when it encounters a random or intentional attack. Different from previous approaches, the congestion control protocols are considered so that the bandwidth can be reallocated among flows. In this way, cascading breakdown is less likely to happen. The flow rates are adjusted when a node is attacked and out of function. Consequently, the traffic utility and the utilization ratio of bandwidth are affected. We compare the real Internet data with the classic random graph and scale-free network models. The simulated results also show that the ldquorobust yet fragilerdquo property previously observed in the study of cascading failures in the scale-free networks is still valid in this scenario.
  • Keywords
    Internet; bandwidth allocation; telecommunication congestion control; telecommunication traffic; transport protocols; Internet; bandwidth allocation; bandwidth utilization ratio; cascading breakdown; complex communication network; congestion control protocol; network attack; traffic performance; Bandwidth; Communication networks; Communication system control; Communication system traffic control; Complex networks; Electric breakdown; IP networks; Internet; Protocols; Traffic control; Bandwidth allocation; Internet; complex networks; vulnerability;
  • fLanguage
    English
  • Journal_Title
    Circuits and Systems II: Express Briefs, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1549-7747
  • Type

    jour

  • DOI
    10.1109/TCSII.2007.908954
  • Filename
    4384448