Skip to main content

Vulnerability Analysis of High Dimensional Complex Systems

  • Conference paper
  • First Online:
Stabilization, Safety, and Security of Distributed Systems (SSS 2010)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6366))

Included in the following conference series:

  • 645 Accesses

Abstract

Complex systems experience dramatic changes in behavior and can undergo transitions from functional to dysfunctional states. An unstable system is prone to dysfunctional collective cascades that result from self-reinforcing behaviors within the system. Because many human and technological civilian and military systems today are complex systems, understanding their susceptibility to collective failure is a critical problem. Understanding vulnerability in complex systems requires an approach that characterizes the coupled behaviors at multiple scales of cascading failures. We used neuromorphic methods, which are modeled on the pattern-recognition circuitry of the brain and can find patterns in high-dimensional data at multiple scales, to develop a procedure for identifying the vulnerabilities of complex systems. This procedure was tested on microdynamic Internet2 network data. The result was a generic pipeline for identifying extreme events in high dimensional datasets.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. B.G.P.: routing table analysis, http://thyme.apnic.net/ (modified August 2006)

  2. BGPmon: Next generation BGP Monitor, http://bgpmon.netsec.colostate.edu/

  3. Border gateway protocol (BGP) data collection standard communities, http://www.bgp4.as/bgp-data-collection-standard-communities (modified February 23, 2006)

  4. New sources of BGP data, http://inl.info.ucl.ac.be/blogs/08-10-27-new-sources-bgp-data (modified October 28, 2008)

  5. University of Oregon Route Views Project, http://www.routeviews.org/ (modified January 25, 2005)

  6. Adam, C., Stadler, R.: Patterns for routing and self-stabilization. In: Proc IEEE/IFPS NOMS (2004)

    Google Scholar 

  7. Bar-Yam, Y.: Multiscale complexity/entropy. Advances in Complex Systems 7, 47–63

    Google Scholar 

  8. Bar-Yam, Y.: Multiscale variety in complex systems. Complexity 9(4), 37–45 (2004)

    Article  MathSciNet  Google Scholar 

  9. Bar-Yam, Y.: Dynamics of Complex Systems. Perseus Press, Cambridge (1997)

    MATH  Google Scholar 

  10. Barabási, A.L., de Menezes, M., Balensiefer, S., Brockman, J.: Hot spots and universality in network dynamics. The European Physical Journal B 38, 169–175 (2004)

    Article  Google Scholar 

  11. Cowie, J., Ogielski, A., Premore, B., Yuan, Y.: Global routing instabilities triggered by Code Red II and Nimda worm attacks

    Google Scholar 

  12. Cowie, J., Ogielski, A., Premore, B., Yuan, Y.: Internet worms and global routing instabilities: scalability and traffic control in IP networks II. In: Proc SPIE, vol. 4868, pp. 195–199 (2002)

    Google Scholar 

  13. Cymru, T.: BGP monitoring, http://www.team-cymru.org/Monitoring/BGP/ (modified 2010)

  14. Dolev, S.: Self-stabilization. MIT Press, Cambridge (2000)

    Book  Google Scholar 

  15. Gheorghiu-Svirchevski, S., Bar-Yam, Y.: Multiscale analysis of information correlations in an infinite-range, ferromagnetic ising system. Phys. Rev. E 70(066115) (2004)

    Google Scholar 

  16. Hohn, N.: Measuring, understanding, and modelling internet traffic

    Google Scholar 

  17. Huberman, B., Lukose, R.: Social dilemmas and internet congestion. Science 277 (1997)

    Google Scholar 

  18. Internet2: http://www.internet2.edu

  19. Izenman, A.: Modern Multivariate Statistical Techniques. Springer, Heidelberg (2008)

    Book  Google Scholar 

  20. Coffman Jr., E.G., Ge, Z., Misra, V., Towsley, D.: Network resilience: exploring cascading failures within bgp. In: Proceedings of Allerton Conference on Communications, Computing, and Control (2001)

    Google Scholar 

  21. Labovitz, C., Malan, G., Jahanian, F.: Internet routing instability 6(5) (1998)

    Google Scholar 

  22. Lakhina, A., Crovella, M., Diot, C.: Mining anomalies using traffic feature distributions. BUCS (002) (2005)

    Google Scholar 

  23. M G.:

    Google Scholar 

  24. Mao, Z., Govindan, R., Varghese, G., Katz, R.: Route flap damping exacerbates internet routing convergence. In: Proceedings of ACM SIGCOMM, Pittsburgh, PA, USA, pp. 221–233 (2002)

    Google Scholar 

  25. de Menezes, M., Barabási, A.L.: Fluctuations in network dynamics. Phys. Rev. Lett. 92(028701) (2008)

    Google Scholar 

  26. Metzler, R., Bar-Yam, Y.: Multiscale analysis of correlated gaussians. Phys. Rev. E 71(046114), 2005 (2005)

    Google Scholar 

  27. Metzler, R., Bar-Yam, Y., Kardar, M.: Information flow through a chaotic channel: prediction and postdiction at finite resolution. Phys. Rev. E 70(020605) (2004)

    Google Scholar 

  28. Misra, V., Harmon, D., de Aguiar, M., Epstein, I., Braha, D., Bar-Yam, Y.: Vulnerability detection in complex systems. Unpublished report (2009)

    Google Scholar 

  29. Motter, A., Lai, Y.C.: Cascade-based attacks on complex networks. Phys. Rev. E 66(065102) (2002)

    Google Scholar 

  30. Nicol, D.: Challenges in using simulation to explain global routing instabilities. In: Conference on Grand Challenges in Simulation (2002)

    Google Scholar 

  31. Perlman, R.: Interconnections: Bridges, Routers, Switches and Internetworking Protocols, 2nd edn. Addison-Wesley Longman, Amsterdam (2001)

    Google Scholar 

  32. Valverde, S., Solé, R.: Internet’s critical path horizon. The European Physical Journal B 38(2) (2004)

    Google Scholar 

  33. Siganos, G., Faloutsos, M.: Detection of BGP routing misbehavior against cyber-terrorism. In: IEEE Military Communications Conference (2005)

    Google Scholar 

  34. Smith, R.: The dynamics of internet traffic: self-similarity, self-organization, and complex phenomena. ArXiV:0806.3374 (2008)

    Google Scholar 

  35. Wang, L., Zhao, X., Pei, D., Bush, R., Massey, D., Mankin, A., Wu, S., Zhang, L.: Observation and analysis of BGP behavior under stress. In: Proceedings of the 2nd ACM SIGCOMM workshop of internet measurement (2002)

    Google Scholar 

  36. Wang, Y.: Protecting mission critical networks. Seminar on Network Security Publications in Telecommunications Software and Multimedia (2001)

    Google Scholar 

  37. Yuan, J., Mills, K.: Macroscopic dynamics in large-scale data networks. Complex Dynamics in Communication Networks (2005)

    Google Scholar 

  38. Zou, C.C., Gong, W., Towsley, D.: Code red worm propagation modeling and analysis. In: Proceedings of the 9th ACM conference on Computer and communications security (2002)

    Google Scholar 

  39. Zou, C., Gao, L., Gong, W., Towsley, D.: Monitoring and early warning for internet worms. In: Proceedings of the 10th ACM conference on Computer and communications security (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Misra, V., Harmon, D., Bar-Yam, Y. (2010). Vulnerability Analysis of High Dimensional Complex Systems. In: Dolev, S., Cobb, J., Fischer, M., Yung, M. (eds) Stabilization, Safety, and Security of Distributed Systems. SSS 2010. Lecture Notes in Computer Science, vol 6366. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16023-3_43

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16023-3_43

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16022-6

  • Online ISBN: 978-3-642-16023-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics