The paper investigates the most critical k cut-sets to target in the context of attacks on networks. The targeted network fails if the attack successfully disables a full cut-set. The attack process is dynamic and targets one link at a time. We assume perfect information, so that the attacker picks the next link to target after identifying the outcome of the attack on the previous one. The attack may continue to reach up to k cut-sets. The problem is to identify which cut-sets to target (referred to as the k-critical cut-sets of the network) that maximize the probability of a successful attack. We distinguish both cases of disjoint and non-disjoint cut-sets. We develop an algorithm for each case with illustrations. We explore the large scale of networks and offer guidelines on the corresponding defensive strategies.
CITATION STYLE
Mrad, M., Suryahatmaja, U. S., Yaghlane, A. B., & Azaiez, M. N. (2020). Optimal k Cut-Sets in Attack/Defense Strategies on Networks. IEEE Access, 8, 131165–131177. https://doi.org/10.1109/ACCESS.2020.3009625
Mendeley helps you to discover research relevant for your work.