• Open Access

Hidden Connectivity in Networks with Vulnerable Classes of Nodes

Sebastian M. Krause, Michael M. Danziger, and Vinko Zlatić
Phys. Rev. X 6, 041022 – Published 27 October 2016

Abstract

In many complex systems representable as networks, nodes can be separated into different classes. Often these classes can be linked to a mutually shared vulnerability. Shared vulnerabilities may be due to a shared eavesdropper or correlated failures. In this paper, we show the impact of shared vulnerabilities on robust connectivity and how the heterogeneity of node classes can be exploited to maintain functionality by utilizing multiple paths. Percolation is the field of statistical physics that is generally used to analyze connectivity in complex networks, but in its existing forms, it cannot treat the heterogeneity of multiple vulnerable classes. To analyze the connectivity under these constraints, we describe each class as a color and develop a “color-avoiding” percolation. We present an analytic theory for random networks and a numerical algorithm for all networks, with which we can determine which nodes are color-avoiding connected and whether the maximal set percolates in the system. We find that the interaction of topology and color distribution implies a rich critical behavior, with critical values and critical exponents depending both on the topology and on the color distribution. Applying our physics-based theory to the Internet, we show how color-avoiding percolation can be used as the basis for new topologically aware secure communication protocols. Beyond applications to cybersecurity, our framework reveals a new layer of hidden structure in a wide range of natural and technological systems.

  • Figure
  • Figure
  • Figure
  • Figure
  • Figure
  • Figure
  • Figure
4 More
  • Received 15 April 2016

DOI:https://doi.org/10.1103/PhysRevX.6.041022

Published by the American Physical Society under the terms of the Creative Commons Attribution 3.0 License. Further distribution of this work must maintain attribution to the author(s) and the published article’s title, journal citation, and DOI.

Published by the American Physical Society

Physics Subject Headings (PhySH)

Interdisciplinary PhysicsStatistical Physics & ThermodynamicsNetworks

Authors & Affiliations

Sebastian M. Krause1,2, Michael M. Danziger3, and Vinko Zlatić1

  • 1Theoretical Physics Division, Rudjer Bošković Institute, Bijenicka c. 54, 10000 Zagreb, Croatia
  • 2Faculty of Physics, University of Duisburg-Essen, Lotharstr. 1, 47048 Duisburg, Germany
  • 3Department of Physics, Bar-Ilan University, Ramat Gan 5290002, Israel

Popular Summary

When assessing the security or robustness of a complex network, it is essential to take into account the fact that many nodes may fail together. For example, businesses within the same geographic area are subject to the same weather events, and computers running the same version of software may be subject to the same security vulnerabilities. Ignoring this heterogeneity of vulnerabilities leads to substantial overestimation of robustness, with potentially catastrophic consequences. Here, we develop a method to analyze this heterogeneity and show how it can be used to improve a system’s functionality.

We color each node by its vulnerability and develop a “color-avoiding” percolation theory that allows us to determine the set of nodes that are connected while avoiding any single color. We apply our framework by proposing a new topological approach to cybersecurity, and we make use of data collected from the autonomous systems-level Internet. If there are entities that control many nodes or software bugs that affect many nodes, eavesdroppers to large sets of nodes may exist. In such a case, we propose splitting the message and transmitting each piece on a path that avoids all of the nodes that are vulnerable to one of the eavesdroppers. Our theory determines which nodes can securely communicate and which paths they should take. Our investigation is the first systematic study of the effect of vulnerability classes on robustness and security.

We expect that our findings will open up a new frontier in the study of complex systems with important practical applications to cybersecurity as well as network robustness.

Key Image

Article Text

Click to Expand

References

Click to Expand
Issue

Vol. 6, Iss. 4 — October - December 2016

Subject Areas
Reuse & Permissions
Author publication services for translation and copyediting assistance advertisement

Authorization Required


×
×

Images

×

Sign up to receive regular email alerts from Physical Review X

Reuse & Permissions

It is not necessary to obtain permission to reuse this article or its components as it is available under the terms of the Creative Commons Attribution 3.0 License. This license permits unrestricted use, distribution, and reproduction in any medium, provided attribution to the author(s) and the published article's title, journal citation, and DOI are maintained. Please note that some figures may have been included with permission from other third parties. It is your responsibility to obtain the proper permission from the rights holder directly for these figures.

×

Log In

Cancel
×

Search


Article Lookup

Paste a citation or DOI

Enter a citation
×