Adversarial Hiding Deception Strategy and Network Optimization Method for Heterogeneous Network Defense
Open Access
- 26 October 2021
- journal article
- research article
- Published by MDPI AG in Electronics
- Vol. 10 (21), 2614
- https://doi.org/10.3390/electronics10212614
Abstract
Heterogeneous networks are powerful tools for describing different types of entities and relationships and are more relevant models of complex networks. The study of heterogeneous network defense is of great practical significance for protecting useful networks such as military combat networks and critical infrastructure networks. However, a large amount of current research on complex network defense focuses on homogeneous networks under complete information conditions, which often ignore the real conditions such as incomplete information and heterogeneous networks. In this paper, we propose firstly a new adversarial hiding deception strategy for heterogeneous network defense under incomplete information conditions. Secondly, we propose an adversarial hiding deception network optimization method based on a genetic algorithm and design node importance index and a fitness function, which take into account the graph structure information and information about the type of nodes. Finally, we conduct comparison experiments for different defense strategies, and the results show that the proposed strategy and network optimization method are effective at hiding the critical nodes and inducing the attacker to attack the non-important nodes. The generated adversarial hiding deception network has a similar graph structure to the real network.Keywords
This publication has 17 references indexed in Scilit:
- Degree-based attacks and defense strategies in complex networksPhysical Review E, 2012
- Enhancing network robustness against malicious attacksPhysical Review E, 2012
- Attack Robustness of Scale-Free Networks Based on Grey InformationChinese Physics Letters, 2011
- Mitigation of malicious attacks on networksProceedings of the National Academy of Sciences of the United States of America, 2011
- Improving the attack tolerance of scale-free networks by adding and hiding edgesPhysica Scripta, 2011
- Power-Law Distributions in Empirical DataSIAM Review, 2009
- ATTACK VULNERABILITY OF COMPLEX NETWORKS BASED ON LOCAL INFORMATIONModern Physics Letters B, 2007
- A Robustness Model of Complex Networks with Tunable Attack Information ParameterChinese Physics Letters, 2007
- Vulnerability of complex networks under intentional attack with incomplete informationJournal of Physics A: Mathematical and Theoretical, 2007
- Emergence of Scaling in Random NetworksScience, 1999