74,727 research outputs found
Vulnerability of weighted networks
In real networks complex topological features are often associated with a
diversity of interactions as measured by the weights of the links. Moreover,
spatial constraints may as well play an important role, resulting in a complex
interplay between topology, weight, and geography. In order to study the
vulnerability of such networks to intentional attacks, these attributes must be
therefore considered along with the topological quantities. In order to tackle
this issue, we consider the case of the world-wide airport network, which is a
weighted heterogeneous network whose evolution and structure are influenced by
traffic and geographical constraints. We first characterize relevant
topological and weighted centrality measures and then use these quantities as
selection criteria for the removal of vertices. We consider different attack
strategies and different measures of the damage achieved in the network. The
analysis of weighted properties shows that centrality driven attacks are
capable to shatter the network's communication or transport properties even at
very low level of damage in the connectivity pattern. The inclusion of weight
and traffic therefore provides evidence for the extreme vulnerability of
complex networks to any targeted strategy and need to be considered as key
features in the finding and development of defensive strategies
Assessing and augmenting SCADA cyber security: a survey of techniques
SCADA systems monitor and control critical infrastructures of national importance such as power generation and distribution, water supply, transportation networks, and manufacturing facilities. The pervasiveness, miniaturisations and declining costs of internet connectivity have transformed these systems from strictly isolated to highly interconnected networks. The connectivity provides immense benefits such as reliability, scalability and remote connectivity, but at the same time exposes an otherwise isolated and secure system, to global cyber security threats. This inevitable transformation to highly connected systems thus necessitates effective security safeguards to be in place as any compromise or downtime of SCADA systems can have severe economic, safety and security ramifications. One way to ensure vital asset protection is to adopt a viewpoint similar to an attacker to determine weaknesses and loopholes in defences. Such mind sets help to identify and fix potential breaches before their exploitation. This paper surveys tools and techniques to uncover SCADA system vulnerabilities. A comprehensive review of the selected approaches is provided along with their applicability
Analyzing wireless communication network vulnerability with homological invariants
This article explains how sheaves and homology theory can be applied to
simplicial complex models of wireless communication networks to study their
vulnerability to jamming. It develops two classes of invariants (one local and
one global) for studying which nodes and links present more of a liability to
the network's performance when under attack.Comment: Submitted to ICASSP 201
DDoS-Capable IoT Malwares: comparative analysis and Mirai Investigation
The Internet of Things (IoT) revolution has not only carried the astonishing promise to interconnect a whole generation of traditionally “dumb” devices, but also brought to the Internet the menace of billions of badly protected and easily hackable objects. Not surprisingly, this sudden flooding of fresh and insecure devices fueled older threats, such as Distributed Denial of Service (DDoS) attacks. In this paper, we first propose an updated and comprehensive taxonomy of DDoS attacks, together with a number of examples on how this classification maps to real-world attacks. Then, we outline the current situation of DDoS-enabled malwares in IoT networks, highlighting how recent data support our concerns about the growing in popularity of these malwares. Finally, we give a detailed analysis of the general framework and the operating principles of Mirai, the most disruptive DDoS-capable IoT malware seen so far
- …