----- Forwarded message from Contempt for Meatheads <[EMAIL PROTECTED]> -----

From: Contempt for Meatheads <[EMAIL PROTECTED]>
Date: Thu, 6 May 2004 14:29:13 -0500
To: FoRK <[EMAIL PROTECTED]>
Subject: [FoRK] How To Attack Scale-Free Networks
X-Mailer: Apple Mail (2.612)

        
Great new bits up on Global Guerillas:

        http://globalguerrillas.typepad.com/globalguerrillas/2004/05/ 
scalefree_terro.html

HOW TO ATTACK SCALE-FREE NETWORKS

Scale-free networks are everywhere. The can be seen in airline traffic  
routes, connections between actors in Hollywood, weblog links, sexual  
relationships, and terrorist networks. So what exactly is a scale-free  
network? A scale-free network is one that obeys a power law  
distribution in the number of connections between nodes on the network.  
Some few nodes exhibit extremely high connectivity (essentially  
scale-free) while the vast majority are relatively poorly connected.  
The reason that scale-free networks emerge, as opposed to evenly  
distributed random networks, is due to these factors:

    * Rapid growth confers preference to early entrants. The longer a  
node has been in place the greater the number of links to it. First  
mover advantage is very important.
    * In an environment of too much information people link to nodes  
that are easier to find. This preferential linking reinforces itself by  
making the easier to find nodes even more easy to find.
* The greater the capacity of the hub (bandwidth, work ethic, etc.) the  
faster its growth.


The Strength and Weaknesses of Scale-Free Networks
The proliferation of scale-free networks and our increasing dependence  
on them (particularly given their prevalence in energy, transportation,  
and communications systems) begs the question: how reliable are these  
networks? Here's some insight into this:

    * Scale-free networks are extremely tolerant of random failures. In  
a random network, a small number of random failures can collapse the  
network. A scale-free network can absorb random failures up to 80% of  
its nodes before it collapses. The reason for this is the inhomogeneity  
of the nodes on the network -- failures are much more likely to occur  
on relatively small nodes.
    * Scale-free networks are extremely vulnerable to intentional  
attacks on their hubs. Attacks that simultaneously eliminate as few as  
5-15% of a scale-free network's hubs can collapse the network.  
Simultaneity of an attack on hubs is important. Scale-free networks can  
heal themselves rapidly if an insufficient number of hubs necessary for  
a systemic collapse are removed.
* Scale-free networks are extremely vulnerable to epidemics. In random  
networks, epidemics need to surpass a critical threshold (a number of  
nodes infected) before it propogates system-wide. Below the threshold,  
the epidemic dies out. Above the threshold, the epidemic spreads  
exponentially. Recent evidence indicates that the threshold for  
epidemics on scale-free networks is zero.


What this means for Counter-terrorists
Given the vulnerability of scale-free networks to intentional  
disruption, what does this mean for counter-terrorist planners (which I  
hope, but doubt, they are thinking about)? This theory has strong  
implications for defense as well as offense. Here's what it means:

    * Eliminating terrorist scale-free network hubs will likely not be  
effective. Non-state terrorist networks are not only scale-free they  
also exhibit small world properties (see "TERRORIST CELLS" for more).  
This means that while large hubs still dominate the network, the  
presence of tight clusters (cells), continues to provide local  
connectivity when the hubs are removed. This implies that the attack on  
al Qaeda's Afghanistan training camps (the location of multiple hubs)  
did not collapse its network in any meaningful way. Rather, it atomized  
the network into anonymous clusters of connectivity until the hubs  
could reassert their priority again. Additionally, many of these  
clusters, even without the global connectivity provided by the hubs,  
will still be able to conduct attacks if they are of sufficient size  
and complexity (a variety of skill sets). A better approach may be to  
observe the hubs covertly to assertain the location of local clusters  
that need to be shut down.
    * Critical terrorist social network hubs cannot be identified based  
on the number of links alone. Hubs vary in value depending on multiple  
vectors such as depth of connections (strong face-to-face social  
history is extremely important for trust development in covert networks  
-- see MAPPING TERRORIST NETWORKS for more), frequency of contact  
(which may indicate the individual is a conduit for information flow  
rather than an resource), and duration of links (which is tied to the  
importance of that individuals skill set to ongoing operations of cells  
they connect to). Analysis of the network along each of vectors can  
make for better decision making.
* Defense against attacks on hubs can be achieved in ways other than  
physical defense. These methods include: increasing the capacity of all  
hubs to absorb the taffic of failed hubs (a kind of surge protection),  
limiting or decreasing the maximum number of connections to any one hub  
(reduction in criticality), and increasing the cross connectivity of  
the network (local pooling of resources).

Posted by John Robb on 07.05.2004 at 09:50 AM | Permalink 

_______________________________________________
FoRK mailing list
http://xent.com/mailman/listinfo/fork

----- End forwarded message -----
-- 
Eugen* Leitl <a href="http://leitl.org";>leitl</a>
______________________________________________________________
ICBM: 48.07078, 11.61144            http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org         http://nanomachines.net

Attachment: pgp00000.pgp
Description: PGP signature

Reply via email to