ID: cond-mat/0408248

Self-Repairing Peer-to-Peer Networks

August 11, 2004

View on ArXiv

Similar papers 2

Disaster Management in Scale-Free Networks: Recovery from and Protection Against Intentional Attacks

April 7, 2005

88% Match
Behnam A. Rezaei, Nima Sarshar, ... , Roychowdhury Vwani P.
Statistical Mechanics
Data Structures and Algorith...
Networking and Internet Arch...
Data Analysis, Statistics an...
Physics and Society

Susceptibility of scale free Power Law (PL) networks to attacks has been traditionally studied in the context of what may be termed as {\em instantaneous attacks}, where a randomly selected set of nodes and edges are deleted while the network is kept {\em static}. In this paper, we shift the focus to the study of {\em progressive} and instantaneous attacks on {\em reactive} grown and random PL networks, which can respond to attacks and take remedial steps. In the process, we ...

Find SimilarView on arXiv

On Intentional Attacks and Protections in Complex Communication Networks

September 13, 2006

87% Match
Shi Xiao, Gaoxi Xiao
Networking and Internet Arch...

Being motivated by recent developments in the theory of complex networks, we examine the robustness of communication networks under intentional attack that takes down network nodes in a decreasing order of their nodal degrees. In this paper, we study two different effects that have been largely missed in the existing results: (i) some communication networks, like Internet, are too large for anyone to have global information of their topologies, which makes the accurate intent...

Find SimilarView on arXiv

Generating Robust and Efficient Networks Under Targeted Attacks

July 5, 2012

87% Match
Vitor H. P. Louzada, Fabio Daolio, ... , Tomassini Marco
Physics and Society
Social and Information Netwo...

Much of our commerce and traveling depend on the efficient operation of large scale networks. Some of those, such as electric power grids, transportation systems, communication networks, and others, must maintain their efficiency even after several failures, or malicious attacks. We outline a procedure that modifies any given network to enhance its robustness, defined as the size of its largest connected component after a succession of attacks, whilst keeping a high efficienc...

Find SimilarView on arXiv

Edge-preserving self-healing: keeping network backbones densely connected

August 30, 2011

87% Match
Atish Das Sarma, Amitabh Trehan
Distributed, Parallel, and C...
Data Structures and Algorith...
Networking and Internet Arch...

Healing algorithms play a crucial part in distributed P2P networks where failures occur continuously and frequently. Several self-healing algorithms have been suggested recently [IPDPS'08, PODC'08, PODC'09, PODC'11] in a line of work that has yielded gradual improvements in the properties ensured on the graph. This work motivates a strong general phenomenon of edge-preserving healing that aims at obtaining self-healing algorithms with the constraint that all original edges in...

Find SimilarView on arXiv

Self-healing systems and virtual structures

February 11, 2012

87% Match
Amitabh Trehan
Distributed, Parallel, and C...
Data Structures and Algorith...

Modern networks are large, highly complex and dynamic. Add to that the mobility of the agents comprising many of these networks. It is difficult or even impossible for such systems to be managed centrally in an efficient manner. It is imperative for such systems to attain a degree of self-management. Self-healing i.e. the capability of a system in a good state to recover to another good state in face of an attack, is desirable for such systems. In this paper, we discuss the s...

Find SimilarView on arXiv

Analysis of Graphs for Digital Preservation Suitability

April 24, 2010

87% Match
Charles L. Cartledge, Michael L. Nelson
Digital Libraries

We investigate the use of autonomically created small-world graphs as a framework for the long term storage of digital objects on the Web in a potentially hostile environment. We attack the classic Erdos - Renyi random, Barab'asi and Albert power law, Watts - Strogatz small world and our Unsupervised Small-World (USW) graphs using different attacker strategies and report their respective robustness. Using different attacker profiles, we construct a game where the attacker is ...

Find SimilarView on arXiv

Effective Self-Healing Networks against Attacks or Disasters in Resource Allocation Control

August 3, 2020

87% Match
Yukio Hayashi, Atsushi Tanaka, Jun Matsukubo
Physics and Society
Social and Information Netwo...
Adaptation and Self-Organizi...

With increasing threats by large attacks or disasters, the time has come to reconstruct network infrastructures such as communication or transportation systems rather than to recover them as before in case of accidents, because many real networks are extremely vulnerable. Thus, we consider self-healing mechanisms by rewirings (reuse or addition of links) to be sustainable and resilient networks even against malicious attacks. In distributed local process for healing, the key ...

Find SimilarView on arXiv

Network Robustness Revisited

February 16, 2022

86% Match
Thilo Gross, Laura Barth
Physics and Society
Soft Condensed Matter

The robustness of complex networks was one of the first phenomena studied after the inception of network science. However, many contemporary presentations of this theory do not go beyond the original papers. Here we revisit this topic with the aim of providing a deep but didactic introduction. We pay particular attention to some complications in the computation of giant component sizes that are commonly ignored. Following an intuitive procedure, we derive simple formulas that...

Find SimilarView on arXiv

Mitigation of Malicious Attacks on Networks

March 9, 2011

86% Match
Christian M. Schneider, Andre A. Moreira, Jose S. Jr. Andrade, ... , Herrmann Hans J.
Physics and Society
Social and Information Netwo...
Computational Physics

Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How and at which cost can one restructure the network such that it will become more robust against a malicious attack? We introduce a unique measure for robustness and use it to devise a method to mitigate economically and efficiently this risk. We demons...

Find SimilarView on arXiv

Scale-free networks resistant to intentional attacks

October 22, 2007

86% Match
Lazaros K. Gallos, Panos Argyrakis
Physics and Society

We study the detailed mechanism of the failure of scale-free networks under intentional attacks. Although it is generally accepted that such networks are very sensitive to targeted attacks, we show that for a particular type of structure such networks surprisingly remain very robust even under removal of a large fraction of their nodes, which in some cases can be up to 70%. The degree distribution $P(k)$ of these structures is such that for small values of the degree $k$ the ...

Find SimilarView on arXiv