K-core-preferred attack to the internet: Is it more malicious than degree attack?

3Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

K-core (k-shell) index is an interesting measure that describes the core and fringe nodes in a complex network. Recent studies have revealed that some high k-core value nodes may play a vital role in information diffusion. As a result, one may expect that attacking high k-core nodes preferentially can collapse the Internet easily. To our surprise, however, the experiments on two Internet AS-level topologies show that: Although a k-core-preferred attack is feasible in reality, it turns out to be less effective than a classic degree-preferred attack. Indeed, as indicated by the measure: normalized susceptibility, we need to remove 2% to 3% more nodes in a k-core-preferred attack to make the network collapsed. Further investigation on the nodes in a same shell discloses that these nodes often have degrees varied drastically, among which there are nodes with high k-core values but low degrees. These nodes cannot contribute many link deletions in an early stage of a k-core-preferred attack, and therefore make it less malicious than a degree-preferred attack. © 2013 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Zhao, J., Wu, J., Chen, M., Fang, Z., & Xu, K. (2013). K-core-preferred attack to the internet: Is it more malicious than degree attack? In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7923 LNCS, pp. 717–728). Springer Verlag. https://doi.org/10.1007/978-3-642-38562-9_73

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free