Uncertainty in vulnerability of networks under attack.

Autor: Ermagun A; Department of Geography and Geoinformation Science, George Mason University, 4400 University Dr., Fairfax, VA, 22030, USA. aermagun@gmu.edu., Tajik N; Department of Industrial and Systems Engineering, Mississippi State University, 501 Hardy Road, 260 McCain Hall, Mississippi State, MS, 39762, USA., Mahmassani H; Department of Civil and Environmental Engineering, Northwestern University, 2145 Sheridan Road, Evanston, IL, 60208, USA.
Jazyk: angličtina
Zdroj: Scientific reports [Sci Rep] 2023 Feb 23; Vol. 13 (1), pp. 3179. Date of Electronic Publication: 2023 Feb 23.
DOI: 10.1038/s41598-023-29899-w
Abstrakt: This study builds conceptual explanations and empirical examinations of the vulnerability response of networks under attack. Two quantities of "vulnerability" and "uncertainty in vulnerability" are defined by scrutinizing the performance loss trajectory of networks experiencing attacks. Both vulnerability and uncertainty in vulnerability quantities are a function of the network topology and size. This is tested on 16 distinct topologies appearing in infrastructure, social, and biological networks with 8 to 26 nodes under two percolation scenarios exemplifying benign and malicious attacks. The findings imply (i) crossing path, tree, and diverging tail are the most vulnerable topologies, (ii) complete and matching pairs are the least vulnerable topologies, (iii) complete grid and complete topologies show the most uncertainty for vulnerability, and (iv) hub-and-spoke and double u exhibit the least uncertainty in vulnerability. The findings also imply that both vulnerability and uncertainty in vulnerability increase with an increase in the size of the network. It is argued that in networks with no undirected cycle and one undirected cycle, the uncertainty in vulnerability is maximal earlier in the percolation process. With an increase in the number of cycles, the uncertainty in vulnerability is accumulated at the end of the percolation process. This emphasizes the role of tailoring preparedness, response, and recovery phases for networks with different topologies when they might experience disruption.
(© 2023. The Author(s).)
Databáze: MEDLINE
Nepřihlášeným uživatelům se plný text nezobrazuje