Given a communication network, we address the problem of computing a lower bound to the transmission rate between two network nodes notwithstanding the presence of an intelligent malicious attacker with limited destructive power. Formally, we are given a link capacitated network N with source node s and destination node t and a budget B for the attacker. We want to compute the Guaranteed Maximum Flow from s to t when an attacker can remove at most B edges. This problem is known to be NP-hard for general networks. For Internet-like networks we present an efficient ILP-based algorithm coupled with instance transformation techniques that allow us to solve the above problem for networks with more than 200 000 nodes and edges within a few minutes. To the best of our knowledge this is the first time that instances of this size for the above problem have been solved for Internet-like networks.
An efficient algorithm for network vulnerability analysis under malicious attacks / Mancini, Toni; Mari, Federico; Melatti, Igor; Salvo, Ivano; Tronci, Enrico. - 11177:(2018), pp. 302-312. (Intervento presentato al convegno 24th International Symposium, ISMIS 2018 tenutosi a Limassol; Cyprus) [10.1007/978-3-030-01851-1_29].
An efficient algorithm for network vulnerability analysis under malicious attacks
Toni Mancini
;Federico Mari
;Igor Melatti
;Ivano Salvo
;Enrico Tronci
2018
Abstract
Given a communication network, we address the problem of computing a lower bound to the transmission rate between two network nodes notwithstanding the presence of an intelligent malicious attacker with limited destructive power. Formally, we are given a link capacitated network N with source node s and destination node t and a budget B for the attacker. We want to compute the Guaranteed Maximum Flow from s to t when an attacker can remove at most B edges. This problem is known to be NP-hard for general networks. For Internet-like networks we present an efficient ILP-based algorithm coupled with instance transformation techniques that allow us to solve the above problem for networks with more than 200 000 nodes and edges within a few minutes. To the best of our knowledge this is the first time that instances of this size for the above problem have been solved for Internet-like networks.File | Dimensione | Formato | |
---|---|---|---|
Mancini_efficient_2018.pdf
solo gestori archivio
Note: https://link.springer.com/chapter/10.1007/978-3-030-01851-1_29
Tipologia:
Documento in Post-print (versione successiva alla peer review e accettata per la pubblicazione)
Licenza:
Tutti i diritti riservati (All rights reserved)
Dimensione
407.12 kB
Formato
Adobe PDF
|
407.12 kB | Adobe PDF | Contatta l'autore |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.