2012 IV International Congress on Ultra Modern Telecommunications and Control Systems 2012
DOI: 10.1109/icumt.2012.6459776
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability of core networks under different epidemic attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2013
2013
2015
2015

Publication Types

Select...
5
1

Relationship

3
3

Authors

Journals

citations
Cited by 6 publications
(11 citation statements)
references
References 15 publications
0
11
0
Order By: Relevance
“…To do so, runs with different protection degrees and failure intensities such as low (10% of the nodes), medium (15%), and high/ severe (20%) have been made. These values have been selected for a heterogeneous connectivity with respect to failures in accordance with our previous analysis based on the average two-terminal reliability [27] of some of the networks [28,29]. This metric is the probability that a randomly chosen pair of nodes is connected for a given percentage of removed nodes.…”
Section: Resultsmentioning
confidence: 99%
“…To do so, runs with different protection degrees and failure intensities such as low (10% of the nodes), medium (15%), and high/ severe (20%) have been made. These values have been selected for a heterogeneous connectivity with respect to failures in accordance with our previous analysis based on the average two-terminal reliability [27] of some of the networks [28,29]. This metric is the probability that a randomly chosen pair of nodes is connected for a given percentage of removed nodes.…”
Section: Resultsmentioning
confidence: 99%
“…Besides instigating failures randomly in the whole network, we also considered the scenario of the network-only node failure, as discussed in [33]. Another significant scenario to measure the system robustness is by introducing the targeted attacks [35], [36], [37]. In the targeted failures case, we considered the betweenness centrality of the nodes to introduce the node failures.…”
Section: Simulation Scenarios and Methodologiesmentioning
confidence: 99%
“…In our previous paper, we have conducted an analysis of the vulnerability of telecommunication networks subject to different epidemic attacks [22], implemented a discrete-event model for evaluating GMPLS-compliant failure notification methods under epidemic failures [23] and evaluated the propagation of epidemic CP failures [24]. In [21], Seoane et al look at the susceptible-infecteddisabled (SID) model in GMPLS rings and present a full set of numerical results, based on an analytical continuous time Markov chain model, analysing the epidemic failure spreading and its relation to the different transition rates.…”
Section: Wwwietdlorgmentioning
confidence: 99%
“…Second, for this 'target node', we can identify the most vulnerable nodes, which become 'hit' by the epidemic failure spreading most times. For these simulations MTTR CP =4h [4,22]. Fig.…”
Section: Epidemic Performance Evaluationmentioning
confidence: 99%