Optimal k Cut-Sets in Attack/Defense Strategies on Networks

4Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The paper investigates the most critical k cut-sets to target in the context of attacks on networks. The targeted network fails if the attack successfully disables a full cut-set. The attack process is dynamic and targets one link at a time. We assume perfect information, so that the attacker picks the next link to target after identifying the outcome of the attack on the previous one. The attack may continue to reach up to k cut-sets. The problem is to identify which cut-sets to target (referred to as the k-critical cut-sets of the network) that maximize the probability of a successful attack. We distinguish both cases of disjoint and non-disjoint cut-sets. We develop an algorithm for each case with illustrations. We explore the large scale of networks and offer guidelines on the corresponding defensive strategies.

Cite

CITATION STYLE

APA

Mrad, M., Suryahatmaja, U. S., Yaghlane, A. B., & Azaiez, M. N. (2020). Optimal k Cut-Sets in Attack/Defense Strategies on Networks. IEEE Access, 8, 131165–131177. https://doi.org/10.1109/ACCESS.2020.3009625

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free