Skip to main content

Towards a Metric for Communication Network Vulnerability to Attacks: A Game Theoretic Approach

  • Conference paper
Game Theory for Networks (GameNets 2012)

Abstract

In this paper, we propose a quantification of the vulnerability of a communication network where links are subject to failures due to the actions of a strategic adversary. We model the adversarial nature of the problem as a 2-player game between a network manager who chooses a spanning tree of the network as communication infrastructure and an attacker who is trying to disrupt the communication by attacking a link. We use previously proposed models for the value of a network to derive payoffs of the players and propose the network’s expected loss-in-value as a metric for vulnerability. In the process, we generalize the notion of betweenness centrality: a metric largely used in Graph Theory to measure the relative importance of a link within a network. Furthermore, by computing and analyzing the Nash equilibria of the game, we determine the actions of both the attacker and the defender. The analysis reveals the existence of subsets of links that are more critical than the others. We characterize these critical subsets of links and compare them for the different network value models. The comparison shows that critical subsets depend both on the value model and on the connectivity of the network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. USN Admiral James Stavridis. Channeling David Sarnoff (September 2006), http://www.aco.nato.int/saceur/channeling-david-sarnoff.aspx

  2. Boyd, S., Vandenberghe, L.: Convex Optimization. Cambridge University Press (March 2004)

    Google Scholar 

  3. Briscoe, B., Odlyzko, A., Tilly, B.: Metcalfe’s Law is Wrong. IEEE Spectrum, 26–31 (July 2006)

    Google Scholar 

  4. Marketing Conversation. Reeds Law States that Social Networks Scale Exponentially (August 2007), http://marketingconversation.com/2007/08/28/reeds-law/

  5. Marketing Conversation. A Short discussion on Metcalfe’s Law for Social Networks (May 2008), http://marketingconversation.com/2007/08/28/reeds-law/

  6. Freeman, L.: Centrality in Social Networks Conceptual Clarification. Social Networks 1(3), 215–239 (1979)

    Article  Google Scholar 

  7. Gilder, G.: Metcale’s Law And Legacy (November 1995), http://www.seas.upenn.edu/~gaj1/metgg.html

  8. Gueye, A.: A Game Theoretical Approach to Communication Security. PhD dissertation, University of California, Berkeley, Electrical Engineering and Computer Sciences (March 2011)

    Google Scholar 

  9. Gueye, A., Marbukh, V., Walrand, J.C.: Towards a Quantification of Communication Network Vulnerability to Attacks: A Game Theoretic Approach. Technical report, National Institute of Standards and Technology (December 2011), http://www.nist.gov/itl/math/cctg/assane.cfm

  10. Gueye, A., Walrand, J.C., Anantharam, V.: Design of Network Topology in an Adversarial Environment. In: Alpcan, T., Buttyán, L., Baras, J.S. (eds.) GameSec 2010. LNCS, vol. 6442, pp. 1–20. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  11. Manshaei, M.H., Zhu, Q., Alpcan, T., Basar, T., Hubaux, J.-P.: Game Theory Meets Network Security and Privacy. Technical report, EPFL, Lausanne (2010)

    Google Scholar 

  12. Medhi, D.: Network Reliability and Fault-Tolerance. John Wiley & Sons, Inc. (2007)

    Google Scholar 

  13. Odlyzko, A., Tilly, B.: A refutation of Metcalfe’s Law and a better estimate for the value of networks and network interconnections

    Google Scholar 

  14. Cisco Press. Spanning Tree Protocol: Introduction (August 2006), http://www.cisco.com/en/US/tech/tk389/tk621/tsd_technology_support_protocol_home.html

  15. Cisco Press. Understanding and Configuring Spanning Tree Protocol (STP) on Catalyst Switches (August 2006), http://www.cisco.com/en/US/tech/tk389/tk621/technologies_configuration_example09186a008009467c.shtml

  16. Reed, D.P.: That Sneaky Exponential: Beyond Metcalfe’s Law to the Power of Community Building (Spring 1999), http://www.reed.com/dpr/locus/gfn/reedslaw.html

  17. Reed, D.P.: Weapon of Math Destruction (February 2003), http://www.immagic.com/eLibrary/ARCHIVES/GENERAL/GENREF/C030200D.pdf

  18. Roy, S., Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V., Wu, Q.: A Survey of Game Theory as Applied to Network Security. In: Hawaii International Conference on System Sciences, pp. 1–10 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Gueye, A., Marbukh, V., Walrand, J.C. (2012). Towards a Metric for Communication Network Vulnerability to Attacks: A Game Theoretic Approach. In: Krishnamurthy, V., Zhao, Q., Huang, M., Wen, Y. (eds) Game Theory for Networks. GameNets 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 105. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35582-0_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35582-0_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35581-3

  • Online ISBN: 978-3-642-35582-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics