NetAttack: Difference between revisions
From Santa Fe Institute Events Wiki
(Created page with 'We're thinking about co-evolving a network and an attacker agent. The network's fitness is robustness (to be defined later) to attack, and the attacker's fitness is disruption of…') |
No edit summary |
||
Line 1: | Line 1: | ||
We're thinking about co-evolving a network and an attacker agent | We're thinking about co-evolving a network and an attacker agent to see which topologies emerge in the network and which strategies may be used by agents within the network to create that topology. The starting point of our idea was the question if networks containing nodes that are "too big too fail" may reduce the resilience if directed attacks against important nodes are performed against the network - or if the networks can in fact reorganize rapidly in case of the failure of a central node. | ||
== Open Issues to be discussed == | |||
- Define a proper research questions | |||
- Fitness of Network components and attackers | - Fitness of Network components and attackers | ||
- Network aim | |||
- Resource constraints | |||
- Genome | - Genome | ||
- Strategies for network components and attackers | - Strategies for network components and attackers | ||
- Network or Agent based | - Network or Agent based | ||
- Real world examples | |||
== Tools == | == Tools == | ||
Java with [http://jung.sourceforge.net/ jung library]? | Java with [http://jung.sourceforge.net/ jung library]? |
Revision as of 03:25, 6 June 2013
We're thinking about co-evolving a network and an attacker agent to see which topologies emerge in the network and which strategies may be used by agents within the network to create that topology. The starting point of our idea was the question if networks containing nodes that are "too big too fail" may reduce the resilience if directed attacks against important nodes are performed against the network - or if the networks can in fact reorganize rapidly in case of the failure of a central node.
Open Issues to be discussed
- Define a proper research questions - Fitness of Network components and attackers - Network aim - Resource constraints - Genome - Strategies for network components and attackers - Network or Agent based - Real world examples
Tools
Java with jung library?