-
A Predator Prey Approach to Diversity Based Defenses in Heterogeneous Networks
Authors:
Sean P. Gorman,
Rajendra G. Kulkarni,
Laurie A. Schintler,
Roger R. Stough
Abstract:
In light of the rise of malicious attacks on the Internet, and the various networks and applications attached to it, new approaches towards modeling predatory activity in networks could be useful. Past research has simulated networks assuming that all vertices are homogenously susceptible to attack or infection. Often times in real world networks only subsets of vertices are susceptible to attac…
▽ More
In light of the rise of malicious attacks on the Internet, and the various networks and applications attached to it, new approaches towards modeling predatory activity in networks could be useful. Past research has simulated networks assuming that all vertices are homogenously susceptible to attack or infection. Often times in real world networks only subsets of vertices are susceptible to attack or infection in a heterogeneous population of vertices. One approach to examining a heterogeneous network susceptible to attack is modeling a network as a predator prey landscape. If each type of vulnerable device is considered a heterogeneous species what level of species diversification is needed to keep a malicious attack from a causing a catastrophic failure to the entire network. This paper explores the predator prey analogy for the Internet and presents findings on how different levels of species diversification effects network resilience. The paper will also discuss the connection between diversification, competition, anti-trust, and national security.
△ Less
Submitted 2 January, 2004;
originally announced January 2004.
-
Spatial Small Worlds: New Geographic Patterns for an Information Economy
Authors:
Sean P. Gorman,
Rajendra Kulkarni
Abstract:
Networks are structures that pervade many natural and man-made phenomena. Recent findings have characterized many networks as not random structures, but as efficent complex formations. Current research has examined complex networks as largely non-spatial phenomena. Location, distance, and geograhpy, though, are vital aspects of a wide variety of networks. This paper will examine the United State…
▽ More
Networks are structures that pervade many natural and man-made phenomena. Recent findings have characterized many networks as not random structures, but as efficent complex formations. Current research has examined complex networks as largely non-spatial phenomena. Location, distance, and geograhpy, though, are vital aspects of a wide variety of networks. This paper will examine the United State's portion of the Internet's infrastructure as a complex network and what role distance and geography play in its formation. From these findings implications will be drawn on the economic, political, and national security impacts of network formation and evolution in an information economy.
△ Less
Submitted 17 October, 2003;
originally announced October 2003.
-
Least Effort Strategies for Cybersecurity
Authors:
Sean P. Gorman,
Rajendra G. Kulkarni,
Laurie A. Schintler,
Roger R. Stough
Abstract:
Cybersecurity is an issue of increasing concern since the events of September 11th. Many questions have been raised concerning the security of the Internet and the rest of the US's information infrastructure. This paper begins to examine the issue by analyzing the Internet's autonomous system (AS) map. Using the AS map, malicious infections are simulated and different defense strategies are cons…
▽ More
Cybersecurity is an issue of increasing concern since the events of September 11th. Many questions have been raised concerning the security of the Internet and the rest of the US's information infrastructure. This paper begins to examine the issue by analyzing the Internet's autonomous system (AS) map. Using the AS map, malicious infections are simulated and different defense strategies are considered in a cost benefit framework. The results show that protecting the most connected nodes provides significant gains in security and that after the small minority of most connected nodes are protected there are diminishing returns for further protection. Although if parts of the small minority are not protected, such as non-US networks, protection levels are significantly decreased.
△ Less
Submitted 24 July, 2003; v1 submitted 30 May, 2003;
originally announced June 2003.