A predator prey approach to the network structure of cyberspace

  • Authors:
  • Sean P. Gorman;Rajendra G. Kulkarni;Laurie A. Schintler;Roger R. Stough

  • Affiliations:
  • George Mason University, Fairfax, Virginia;George Mason University, Fairfax, Virginia;George Mason University, Fairfax, Virginia;George Mason University, Fairfax, Virginia

  • Venue:
  • WISICT '04 Proceedings of the winter international synposium on Information and communication technologies
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

In light of the rise of malicious attacks on the Internet and the various networks and applications attached to it, new approaches towards modeling predatory activity in networks is called for. Past research has simulated networks assuming that all nodes are homogenously susceptible to attack or infection. Often times in real world networks only subsets of nodes are susceptible attack or infection in a heterogeneous population of nodes. One approach to examining a heterogeneous network susceptible to attack is modeling cyberspace as a predator prey landscape. If each type of vulnerable device is considered a heterogeneous species what level of species diversification is needed to keep a malicious attack from a causing a catastrophic failure to the entire network. This paper explores the predator prey analogy for the Internet and presents findings on how different levels of species diversification effects network resilience. The paper will also discuss the connection between diversification, competition, anti-trust, and national security.