Optimal control of networks in the presence of attackers and defenders
From MaRDI portal
Publication:4575481
DOI10.1063/1.5030899zbMATH Open1395.49034arXiv1804.02033OpenAlexW2795509894WikidataQ88952729 ScholiaQ88952729MaRDI QIDQ4575481FDOQ4575481
Authors: Ishan Kafle, Sudarshan Bartaula, Afroza Shirin, Isaac Klickstein, Pankaz Das, F. Sorrentino
Publication date: 13 July 2018
Published in: Chaos: An Interdisciplinary Journal of Nonlinear Science (Search for Journal in Brave)
Abstract: We consider the problem of a dynamical network whose dynamics is subject to external perturbations (`attacks') locally applied at a subset of the network nodes. We assume that the network has an ability to defend itself against attacks with appropriate countermeasures, which we model as actuators located at (another) subset of the network nodes. We derive the optimal defense strategy as an optimal control problem. We see that the network topology, as well as the distribution of attackers and defenders over the network affect the optimal control solution and the minimum control energy. We study the optimal control defense strategy for several network topologies, including chain networks, star networks, ring networks, and scale free networks.
Full work available at URL: https://arxiv.org/abs/1804.02033
Recommendations
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- The power grid as a complex network: a survey
- Padé approximation for the exponential of a block triangular matrix
- Note on a graph-theoretic criterion for structural output controllability
- Attacker–defender models and road network vulnerability
Cited In (5)
- Cascade defense via control of the fluxes in complex networks
- Selecting energy efficient inputs using graph structure
- A jointly optimal design of control and scheduling in networked systems under denial-of-service attacks
- How zealots affect the energy cost for controlling complex social networks
- Efficient best response computation for strategic network formation under attack
This page was built for publication: Optimal control of networks in the presence of attackers and defenders
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4575481)