On power-law relationships of the Internet topology
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Mapping Cyberspace
Hi-index | 0.00 |
In light of the rise of malicious attacks on the Internet and the various networks and applications attached to it, new approaches towards modeling predatory activity in networks is called for. Past research has simulated networks assuming that all nodes are homogenously susceptible to attack or infection. Often times in real world networks only subsets of nodes are susceptible attack or infection in a heterogeneous population of nodes. One approach to examining a heterogeneous network susceptible to attack is modeling cyberspace as a predator prey landscape. If each type of vulnerable device is considered a heterogeneous species what level of species diversification is needed to keep a malicious attack from a causing a catastrophic failure to the entire network. This paper explores the predator prey analogy for the Internet and presents findings on how different levels of species diversification effects network resilience. The paper will also discuss the connection between diversification, competition, anti-trust, and national security.