2015
DOI: 10.1016/j.physa.2015.04.024
|View full text |Cite
|
Sign up to set email alerts
|

Detecting link failures in complex network processes using remote monitoring

Abstract: h i g h l i g h t s• We study detection of network changes from remote noisy time-series measurements.• A Maximum A-Posteriori Probability hypothesis testing scheme is employed.• Relationships between the network topology and MAP detector performance are developed. • Detector performance depends on presence of certain paths in the network. • Simulations demonstrate the analytical results developed. a b s t r a c tWe study whether local structural changes in a complex network can be distinguished from passive r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(16 citation statements)
references
References 28 publications
0
16
0
Order By: Relevance
“…For a predetermined set of input nodes K, the focus of our analysis is to characterize the performance of the detector (5), in terms of the network's adjacency matrix G. The performance of the detector ( 5) is measured by its error probability, which is given by…”
Section: Preliminaries and Problem Setupmentioning
confidence: 99%
See 1 more Smart Citation
“…For a predetermined set of input nodes K, the focus of our analysis is to characterize the performance of the detector (5), in terms of the network's adjacency matrix G. The performance of the detector ( 5) is measured by its error probability, which is given by…”
Section: Preliminaries and Problem Setupmentioning
confidence: 99%
“…In recent years, researchers have proposed a number of model-based and heuristic approaches for detecting and mitigating attacks against the actuators and the sensors in the network (see [2] and the references therein). Despite the success of these studies in revealing the performance and the limitations of attack detection mechanisms, several challenges remain, particularly in distinguishing malicious signals from ambient data, selecting optimal sensor locations to maximize the detection performance [3,4], and deriving simple graphical rubrics to readily evaluate and optimize network security [5,6].…”
Section: Introductionmentioning
confidence: 99%
“…42 In addition, the expressions indicate that manipulation is difficult, if the entries in the eigenvectors of A (and hence of L) corresponding to the measurement location are small. Recently, graph-theoretic results on the eigenvector components of the Laplacian have also been established, see, eg, the works of Dhal et al 43 and Torres and Roy. 44 These results indicate that the slow modal dynamics can be most easily manipulated from extreme points in the graph, but overall controllability is often strongest near the center; details are omitted.…”
Section: Theorem 3 the Trace Of The Inverse Of Reachabilitymentioning
confidence: 99%
“…Recently, graph-theoretic results on the eigenvector components of the Laplacian have also been established, see e.g. [21,22]. These results indicate the slow modal dynamics can be most easily manipulated from extreme points in the graph, but overall controllability is often strongest near the center; details are omitted.…”
Section: Formula For the Gramian Inversementioning
confidence: 99%