vilhelm - Attacking and Defending Random Networks Vilhelm...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Attacking and Defending Random Networks Vilhelm Sjöberg November 24, 2009
Background image of page 2
How hard is it to break up a network? Motivating examples: Police targeting terrorist networks Music industry disrupting P2P networks Drugs attacking biological pathways in bacteria Health service containing an epidemic disease
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Exponential vs Scale-free networks Recall: The Erd˝os-Rényi model produces a Poisson degree distribution with a sharp peak and exponential fall-off. The preferential-attachement model produces a degree distribution P ( k ) k 3 . . . . what if we attack them?
Background image of page 4
Error and Attack Tolerance 1 Generate an Erd˝os-Rényi and a preferential-attachment network, with parameters so that both have n = 10 , 000 nodes and 20 , 000 links. Either Randomly delete r nodes. Delete the r highest degree nodes. How does the diameter of the networks change? 1 Reka Albert, Hawoong Jeong, and Albert-Laszlo Barabasi. Error and attack tolerance of complex networks. Nature , 406:378, 2000
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Results 0.00 0.02 0.04 4 6 8 10 12 a d SF E Attack Failure
Background image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 12/08/2011 for the course CIS 677 taught by Professor Michaelkearns during the Fall '09 term at Pennsylvania State University, University Park.

Page1 / 22

vilhelm - Attacking and Defending Random Networks Vilhelm...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online