Given a communication network, we address the problem of computing a lower bound to the transmission rate between two network nodes notwithstanding the presence of an intelligent malicious attacker with limited destructive power. Formally, we are given a link capacitated network N with source node s and destination node t and a budget B for the attacker. We want to compute the Guaranteed Maximum Flow from s to t when an attacker can remove at most B edges. This problem is known to be NP-hard for general networks. For Internet-like networks we present an efficient ILP-based algorithm coupled with instance transformation techniques that allow us to solve the above problem for networks with more than 200 000 nodes and edges within a few minutes. To the best of our knowledge this is the first time that instances of this size for the above problem have been solved for Internet-like networks.

An efficient algorithm for network vulnerability analysis under malicious attacks / Mancini, Toni; Mari, Federico; Melatti, Igor; Salvo, Ivano; Tronci, Enrico. - 11177:(2018), pp. 302-312. (Intervento presentato al convegno 24th International Symposium, ISMIS 2018 tenutosi a Limassol; Cyprus) [10.1007/978-3-030-01851-1_29].

An efficient algorithm for network vulnerability analysis under malicious attacks

Toni Mancini
;
Federico Mari
;
Igor Melatti
;
Ivano Salvo
;
Enrico Tronci
2018

Abstract

Given a communication network, we address the problem of computing a lower bound to the transmission rate between two network nodes notwithstanding the presence of an intelligent malicious attacker with limited destructive power. Formally, we are given a link capacitated network N with source node s and destination node t and a budget B for the attacker. We want to compute the Guaranteed Maximum Flow from s to t when an attacker can remove at most B edges. This problem is known to be NP-hard for general networks. For Internet-like networks we present an efficient ILP-based algorithm coupled with instance transformation techniques that allow us to solve the above problem for networks with more than 200 000 nodes and edges within a few minutes. To the best of our knowledge this is the first time that instances of this size for the above problem have been solved for Internet-like networks.
2018
24th International Symposium, ISMIS 2018
Vulnerability analysis; Guaranteed maximum flow; Internet-like networks
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
An efficient algorithm for network vulnerability analysis under malicious attacks / Mancini, Toni; Mari, Federico; Melatti, Igor; Salvo, Ivano; Tronci, Enrico. - 11177:(2018), pp. 302-312. (Intervento presentato al convegno 24th International Symposium, ISMIS 2018 tenutosi a Limassol; Cyprus) [10.1007/978-3-030-01851-1_29].
File allegati a questo prodotto
File Dimensione Formato  
Mancini_efficient_2018.pdf

solo gestori archivio

Note: https://link.springer.com/chapter/10.1007/978-3-030-01851-1_29
Tipologia: Documento in Post-print (versione successiva alla peer review e accettata per la pubblicazione)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 407.12 kB
Formato Adobe PDF
407.12 kB Adobe PDF   Contatta l'autore

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/1184394
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 15
  • ???jsp.display-item.citation.isi??? ND
social impact