Abstract
In many complex systems representable as networks, nodes can be separated into different classes. Often these classes can be linked to a mutually shared vulnerability. Shared vulnerabilities may be due to a shared eavesdropper or correlated failures. In this paper, we show the impact of shared vulnerabilities on robust connectivity and how the heterogeneity of node classes can be exploited to maintain functionality by utilizing multiple paths. Percolation is the field of statistical physics that is generally used to analyze connectivity in complex networks, but in its existing forms, it cannot treat the heterogeneity of multiple vulnerable classes. To analyze the connectivity under these constraints, we describe each class as a color and develop a “color-avoiding” percolation. We present an analytic theory for random networks and a numerical algorithm for all networks, with which we can determine which nodes are color-avoiding connected and whether the maximal set percolates in the system. We find that the interaction of topology and color distribution implies a rich critical behavior, with critical values and critical exponents depending both on the topology and on the color distribution. Applying our physics-based theory to the Internet, we show how color-avoiding percolation can be used as the basis for new topologically aware secure communication protocols. Beyond applications to cybersecurity, our framework reveals a new layer of hidden structure in a wide range of natural and technological systems.
4 More- Received 15 April 2016
DOI:https://doi.org/10.1103/PhysRevX.6.041022
Published by the American Physical Society under the terms of the Creative Commons Attribution 3.0 License. Further distribution of this work must maintain attribution to the author(s) and the published article’s title, journal citation, and DOI.
Published by the American Physical Society
Physics Subject Headings (PhySH)
Popular Summary
When assessing the security or robustness of a complex network, it is essential to take into account the fact that many nodes may fail together. For example, businesses within the same geographic area are subject to the same weather events, and computers running the same version of software may be subject to the same security vulnerabilities. Ignoring this heterogeneity of vulnerabilities leads to substantial overestimation of robustness, with potentially catastrophic consequences. Here, we develop a method to analyze this heterogeneity and show how it can be used to improve a system’s functionality.
We color each node by its vulnerability and develop a “color-avoiding” percolation theory that allows us to determine the set of nodes that are connected while avoiding any single color. We apply our framework by proposing a new topological approach to cybersecurity, and we make use of data collected from the autonomous systems-level Internet. If there are entities that control many nodes or software bugs that affect many nodes, eavesdroppers to large sets of nodes may exist. In such a case, we propose splitting the message and transmitting each piece on a path that avoids all of the nodes that are vulnerable to one of the eavesdroppers. Our theory determines which nodes can securely communicate and which paths they should take. Our investigation is the first systematic study of the effect of vulnerability classes on robustness and security.
We expect that our findings will open up a new frontier in the study of complex systems with important practical applications to cybersecurity as well as network robustness.