2020
DOI: 10.1109/access.2020.3009625
|View full text |Cite
|
Sign up to set email alerts
|

Optimal k Cut-Sets in Attack/Defense Strategies on Networks

Abstract: The paper investigates the most critical k cut-sets to target in the context of attacks on networks. The targeted network fails if the attack successfully disables a full cut-set. The attack process is dynamic and targets one link at a time. We assume perfect information, so that the attacker picks the next link to target after identifying the outcome of the attack on the previous one. The attack may continue to reach up to k cut-sets. The problem is to identify which cut-sets to target (referred to as the k-c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
19
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(19 citation statements)
references
References 28 publications
0
19
0
Order By: Relevance
“…In this section, we expose the network interdiction problem of interest to the current study. Actually, we extend previous contributions of Yaghlane et al [3], [4] and Mrad et al [2]. We will suggest a solution method that adapts to each of the three problems under consideration, as adequate, accounting for attacker resource availability as well as multiple cut-sets to target.…”
Section: The Problemmentioning
confidence: 69%
See 4 more Smart Citations
“…In this section, we expose the network interdiction problem of interest to the current study. Actually, we extend previous contributions of Yaghlane et al [3], [4] and Mrad et al [2]. We will suggest a solution method that adapts to each of the three problems under consideration, as adequate, accounting for attacker resource availability as well as multiple cut-sets to target.…”
Section: The Problemmentioning
confidence: 69%
“…This article extends interdiction network models by Mrad et al [2] and Yaghlane et al [3], [4] by incorporating a budget constraint. In fact, the above studies identify optimal attack strategies without accounting for resource restrictions.…”
Section: Introductionmentioning
confidence: 85%
See 3 more Smart Citations