Attack vulnerability of complex communication networks

Yongxiang Xia*, David J. Hill

*Corresponding author for this work

    Research output: Contribution to journalArticlepeer-review

    88 Citations (Scopus)

    Abstract

    The Internet has been studied as a typical example of real-world complex networks. In this brief, we study the traffic performance of the Internet when it encounters a random or intentional attack. Different from previous approaches, the congestion control protocols are considered so that the bandwidth can be reallocated among flows. In this way, cascading breakdown is less likely to happen. The flow rates are adjusted when a node is attacked and out of function. Consequently, the traffic utility and the utilization ratio of bandwidth are affected. We compare the real Internet data with the classic random graph and scale-free network models. The simulated results also show that the ldquorobust yet fragilerdquo property previously observed in the study of cascading failures in the scale-free networks is still valid in this scenario.

    Original languageEnglish
    Pages (from-to)65-69
    Number of pages5
    JournalIEEE Transactions on Circuits and Systems II: Express Briefs
    Volume55
    Issue number1
    DOIs
    Publication statusPublished - 2008

    Fingerprint

    Dive into the research topics of 'Attack vulnerability of complex communication networks'. Together they form a unique fingerprint.

    Cite this