Coping with Physical Attacks on Random Network Structures Omer Gold omergolden@gmail.com Joint work with Reuven Cohen (BIU) To appear in the Proceedings of IEEE International Conference on Communications (ICC), June, 2014. Content Problem and motivation Previous work Overview Random Network model Algorithms and Analyses Summary Problems and motivation Communication networks are vulnerable to natural disasters, such as earthquakes or floods, as well as to physical attacks, such as an Electromagnetic Pulse (EMP) attack. Such real-world events happen in specific geographical locations and disrupt specific parts of the network. Therefore, the geographical layout of the network determines the impact of such events on the network’s connectivity. Large Scale Physical Attacks/Disasters EMP (Electromagnetic Pulse) attack, Solar Flares, and other Natural Disasters ◦ will destroy backbone nodes and links Physical attacks or disasters affect a specific geographical area ◦ Fibers, routers, generators, and power lines have a physical location Source: Report of the Commission to Assess the threat to the United States from Electromagnetic Pulse (EMP) Attack, 2008 4 Problems and motivation An interesting question is to identify the most vulnerable parts of the network. That is, the locations of disasters that would have the maximum disruptive effect on the network in terms of capacity and connectivity. We consider graph models in which nodes and links are geographically located on a plane, and model the disaster event as a line segment or a circular cut. Problems and motivation Definition 1 (Performance Measures): The performance measures of a cut are (the last 3 are defined as the values after the removal of the intersected links): • TEC - The total expected capacity of the intersected links. • ATTR - The average two terminal reliability of the network. (Connectivity measure) • MFST - The maximum flow between a given pair of nodes s and t. • AMF - The average value of maximum flow between all pairs of nodes. Example – Circular cut 𝒄𝒖𝒕∗ 7 3 2 7 9 Q. What is the TEC measure for this cut? A. 2+3+7+9+7 = 28 *The black links are not affecetd by the cut. Problems and motivation Definition 2 (Worst-Case Cut): Under a specific performance measure, a worstcase cut is a cut which maximizes/minimizes the value of the performance measure. Problems and motivation Geographical Network Inhibition by Circles (GNIC) Problem (2009): Given a graph, cut radius, link probabilities, and capacities, find a worst-case circular cut under performance measure TEC. After solving TEC measure problem in polynomial time, it can be shown that the other performance measures(ATTR, MFST, AMF) are also polynomial. (Zussman, Neumayer, Cohen, Modiano. 2009). We will focus from now on the TEC measure. Example – Real Network The fiber backbone operated by a major U.S. network provider We want to find a cut that maximizes TEC, denote as “worst-cut”. Previous Work Overview S. Neumayer, G. Zussman, R. Cohen, E. Modiano (IEEE INFOCOM 2009) Showed polynomial time algorithms that finds Worst-Case Circular Cut in 𝑂 𝑁 6 time Improvements have been made for some performance measures using tools from Computational Geometry (Arrangements) P. K. Agarwal, A. Efrat, S. K. Ganjugunte, D. Hay, S. Sankararamany and G. Zussman. (IEEE MILCOM 2010) Previous Work Overview Network Reliability Under Random LineSegment Cut: Calculate some network performance metrics to such a disaster in polynomial time. S. Neumayer, E. Modiano (IEEE Infocom 2010) Network Reliability Under Random CircularCut disasters that take the form of a `randomly' located disk in a plane. Approximate some network performance metrics in case of such a disaster in polynomial time. S. Neumayer, E. Modiano (IEEE Globecom 2011) Previous Work: Probabilistic Failures Major work has been made recently about generalizing previous failure model to probabilistic failure model and simultaneous attack failures. Work by: Pankaj K. Agarwal, Alon Efrat, Shashidhara K. Ganjugunte, David Hay, Swaminathan Sankararaman, Gil Zussman: The resilience of WDM networks to probabilistic geographical failures. INFOCOM 2011: 1521-1529 Later improved version in: IEEE/ACM Trans. Netw. 21(5): 1525-1538 (2013) Another improvement and variation has been recently made by: Pankaj K. Agarwal, Sariel Har-Peled, Haim Kaplan, Micha Sharir: Union of Random Minkowski Sums and Network Vulnerability Analysis. Previous Work Overview Failure Models Deterministic: ◦ Fails definitely if within range Probabilistic: ◦ Simple: fails with a probability q if within range ◦ Spatial Probability Functions Linear, Gaussian, Arbitrary* P. Agrawal, A. Efrat, S. Ganjugunte, D. Hay, S. Sankararaman,G. Zussman IEEE Infocom 2011 Random Network As we saw, models with deterministic, random and probabilistic failures have been recently studied extensively . What about Random Networks? This is what we are going to talk about here. Our work is about developing algorithms for finding “worst-cuts” in Random Networks, as well as developing methods to model a random network from a given data, such as: demographic map, terrain conditions, economic considerations, etc. Random Network- Motivation The attacker (adversary) has partial or no knowledge about the network topology. Adversary has a “noisy” network topology map. Assessing the reliability of hidden networks. Real-life networks topology sometimes presents similar characteristics to a random network topology. Random Network- Our Model We model a random network in a rectangle which bounds the country’s extreme points +cut’s radius 𝑟. 𝑟 𝑟 𝑟 𝑟 𝑅𝑒𝑐 = 𝑎, 𝑏 𝑥[𝑐, 𝑑] Random Network- Our Model The main idea of our stochastic modeling is in considering the configuration of the stations as realizations of non-homogeanus Poisson point process. The main advantage of a Poisson process is it's simplicity. The distribution of a Poisson point process is completely defined through the intensity measure 𝑓() representing the mean density of points. Random Network- Our Model Network Model Formulation: 𝑁 = < 𝑝~Π 𝑓 , 𝑙𝑖𝑛𝑘~𝜔(), 𝑐~𝐻(), 𝑅𝑒𝑐 > Nodes are distributed in the rectangle Rec through a Spatial Non-Homogenous Poisson Point Process Π(𝑓) where 𝑓() is the intensity function of the 𝑃𝑃𝑃. Let 𝜔(𝑝𝑖 , 𝑝𝑗 ) be the probability for the existence of a link between two nodes located at 𝑝𝑖 and 𝑝𝑗 in Rec. 𝐻(𝑐, 𝑝𝑖 , 𝑝𝑗 ) is the cumulative distribution function of the link capacity between two connected nodes. i.e. 𝑃(𝐶𝑖𝑗 < 𝑐) = 𝐻(𝑐, 𝑝𝑖 , 𝑝𝑗 ) where 𝑝𝑖 and 𝑝𝑗 are the locations of nodes 𝑖 and 𝑗, respectively. Random Network- Model It is reasonable to assume that 𝜔(𝑝𝑖 , 𝑝𝑗 ) and 𝐻(𝑐, 𝑝𝑖 , 𝑝𝑗 ) can be computed easily as a function of the distance from 𝑝𝑖 to 𝑝𝑗 and that the possible capacity between them is bounded (denote by max{𝑐𝑎𝑝𝑎𝑐𝑖𝑡𝑦}). Random Network- Model We assume the following: the intensity function 𝑓(), 𝜔 (), and ℎ() (the derivative of H()) are functions of constant description complexity, they are continuously differentiable and Riemann-integrable over Rec. Implies that our probability functions are of bounded variation over Rec as their derivatives receives maximum over the compact set 𝑅𝑒𝑐 ⊆ ℝ2 . Algorithm – Evaluate Damage We present Polynomial Time Approximation Algorithms for finding the Expected Worst Case cuts location and damage in the Random Network model, i.e. cut that maximizes the total expected capacity of the intersected links (TEC). For this goal we first develop an algorithm to evaluate the TEC (Damage) for a given cut. Evaluate Damage of a Circular Attack (i.e. “cut”) For a cut 𝐷, we divide the intersections of 𝐷 with the graph's edges into 3 independent types: 𝛼 − 𝑙𝑖𝑛𝑘, is the case where the entire edge is inside 𝐷. which means both endpoints of the edge are inside 𝐷. 𝛽 − 𝑙𝑖𝑛𝑘, is the case where one endpoint is inside 𝐷 and the other is outside 𝐷. 𝛾 − 𝑙𝑖𝑛𝑘, is the case where both endpoints are outside from 𝐷 and the link which connects the endpoints intersects 𝐷. Example: 𝛼 − 𝑙𝑖𝑛𝑘 demonstration 𝛽 − 𝑙𝑖𝑛𝑘 demonstration 𝛾 − 𝑙𝑖𝑛𝑘 demonstration Example – Circular cut 𝐷 7 3 2 9 A red link is an 𝛼 − 𝑙𝑖𝑛𝑘 A blue link is a 𝛽 − 𝑙𝑖𝑛𝑘 An Orange link is a 𝛾 − 𝑙𝑖𝑛𝑘 7 Evaluate Damage of Circular Attack For 𝜎 ∈ 𝛼, 𝛽, 𝛾 , let 𝑋𝜎 be the total capacity of the intersected 𝜎 − 𝑙𝑖𝑛𝑘 type edges with cut 𝐷. Namely, the damage determined by 𝜎 − 𝑙𝑖𝑛𝑘𝑠. Thus, it holds that the expected capacity of the intersected links of types 𝛼, 𝛽 and 𝛾 is determined by: Evaluate Damage of Circular Attack where 𝑔(𝑢, 𝑣) = 𝜔(𝑢, 𝑣) max{𝑐𝑎𝑝𝑎𝑐𝑖𝑡𝑦} ℎ 0 𝑐, 𝑢, 𝑣 𝑐 𝑑𝑐 is the expected capacity between two nodes at points 𝑢 and 𝑣. Evaluate Damage of Circular Attack 𝐼(𝑢, 𝑣, 𝐷) is the indicator function, giving 1 if the segment (𝑢, 𝑣) intersects the circle 𝐷 and 0 otherwise. Evaluate Damage of Circular Attack Let 𝑋 = 𝑋𝛼 + 𝑋𝛽 + 𝑋𝛾 be the total damage determined by all the intersected links with cut 𝐷. Due to the linearity of expectation, we get that the total expected capacity of the intersected links (TEC) is 𝐸[𝑋] = 𝐸[𝑋𝛼 ] + 𝐸[𝑋𝛽 ] + 𝐸[𝑋𝛾 ]. Algorithm to Evaluate the Expected Damage for a given Cut. Algorithm to evaluate the TEC (Damage) for a given cut 𝐷 = 𝑐𝑢𝑡 𝑝, 𝑟 . 𝑬𝑫𝑪𝑪 𝑵, 𝑫, 𝝐 : Input: 𝑁 =< Π 𝑓 , 𝜔(), 𝐻(), 𝑅𝑒𝑐 > 𝐷 = 𝑐𝑢𝑡(𝑝, 𝑟) 𝜖 − 𝑎𝑐𝑐𝑢𝑟𝑎𝑐𝑦 𝑝𝑎𝑟𝑎𝑚𝑒𝑡𝑒𝑟 Output: TEC (Damage) caused by 𝐷 Algorithm to Evaluate the Expected Damage for a given Cut. Computing the 𝛼 − 𝑙𝑖𝑛𝑘 Damage: 𝐸 𝑋𝛼 1 = 2 𝑓 𝑢 𝑓 𝑣 𝑔 𝑢, 𝑣 𝑑𝑢𝑑𝑣 𝐷 𝐷 Computing the 𝛽 − 𝑙𝑖𝑛𝑘 Damage: 𝐸 𝑋𝛽 = 𝑓 𝑢 𝑓 𝑣 𝑔 𝑢, 𝑣 𝑑𝑢𝑑𝑣 𝐷 𝑅𝑒𝑐−𝐷 Algorithm to Evaluate the Expected Damage for a given Cut. How to compute the 𝛾 − 𝑙𝑖𝑛𝑘 damage? Requires more sophisticated approach. First, let’s ask the following: For a node 𝑢 ∈ 𝑅𝑒𝑐 ∖ 𝐷, what is the set of points 𝑎𝑟𝑒𝑎 𝐾𝑢 in 𝑅𝑒𝑐 ∖ 𝐷 that satisfies: For every node 𝑣 ∈ 𝑎𝑟𝑒𝑎 (𝐾𝑢 ), the edge 𝑢, 𝑣 intersects 𝐷, and for every node 𝑤 ∉ 𝑎𝑟𝑒𝑎(𝐾𝑢 ) the edge 𝑢, 𝑤 does not intersect 𝐷? Example: Evaluate the Expected Damage for a given Cut. Computing the 𝛾 − 𝑙𝑖𝑛𝑘 Damage: Following the idea we just saw, we want to integrate for all such possible nodes 𝑢 and 𝑣. We use numerical integration: We divide 𝑅𝑒𝑐 into a Grid of squares. Algorithm to Evaluate the Expected Damage for a given Cut. Evaluate_𝜸 − 𝒍𝒊𝒏𝒌(𝑢, 𝐷, Grid) 1. Create two tangents to 𝐷 going out from 𝑢. 2. Denote the line segments of the tangents which their endpoints are the intersection point of the tangent with 𝑅𝑒𝑐 boundary by 𝑡1 and 𝑡2 . 3. Denote by 𝑎𝑟𝑒𝑎(𝐾) is the set of points which is bounded by 𝑡1 , 𝑡2 , 𝐷 and the boundary of 𝑅𝑒𝑐. 4. Return 𝑓 𝑣 𝑔(𝑢, 𝑣)𝑑𝑣 𝑎𝑟𝑒𝑎(𝐾𝑢 ) Algorithm to Evaluate the Expected Damage for a given Cut. Computing the 𝛾 − 𝑙𝑖𝑛𝑘 Damage: 𝐸 𝑋𝛾 = 1 𝑓 𝑢 Evaluate_𝜸 − 𝒍𝒊𝒏𝒌(𝑢, 𝐷, 𝐺𝑟𝑖𝑑) 𝑑𝑢 2 𝑅𝑒𝑐−𝐷 This integral is computed numerically over the Grid. The denser the Grid, the more accurate result we obtain. Finally, Return 𝐸 𝑋𝛼 + 𝐸 𝑋𝛽 + 𝐸 𝑋𝛾 Graphic Example to 𝛾-link damage computation 𝒄𝒖𝒕∗ 𝒂𝒓𝒆𝒂(𝑲) How? • We run over the squares center-point. • Size of the Grid (squares) is determined by the requested accuracy parameters. Algorithm to Evaluate the Expected Damage for a given Cut. We define an additive 𝜖 − 𝑎𝑝𝑝𝑟𝑜𝑥𝑖𝑚𝑎𝑡𝑖𝑜𝑛 to the cut capacity as a quantity 𝐶 satisfying: 𝐶−𝜖 ≤𝐶 ≤𝐶+𝜖 Where 𝐶 is the actual capacity intersecting the cut. Numerical Accuracy We refer the side length of the grid squares as the “grid-constant” Δ. We denote the set of squares center-points as “grid points”. We restrict our results to the case where Δ < 𝑟/2, as otherwise the approximation is too crude to consider. Numerical Accuracy The leading term in the error when integrating numerically over the grid points, as Δ → 0 is obtained by the following geometric results Numerical Accuracy 𝑡1 and 𝑡2 are tangents to a circle of radius ∆ centered at 𝑢 and to the circular cut. The colored areas depicts the extremum of difference for possible 𝛾 − 𝑙𝑖𝑛𝑘𝑠 endpoints emanating from a point within the circle centered at 𝑢 at one side of the cut. Numerical Accuracy For simplicity, let’s look at this We want to bound the grey area using Δ. Numerical Accuracy Using trigonometry and technique this area can be bounded by 𝑎 Δ where 𝑎 ≤ const ⋅ 𝐿2 𝑟 and 𝐿 is the diagonal length of 𝑅𝑒𝑐. Basic idea is calculation of the head angle using Δ and 𝑟 of the grey triangle where bounding its sides with 𝐿. Numerical Accuracy First, let’s look at the extreme case: tan 2𝛼 = 2Δ 𝑏2 − 4Δ2 2𝛼 2 tan 𝛼 Using tan 2𝛼 = 1−tan2 𝛼 We can obtain that 𝑟Δ ≤ 𝑏2 ≤ 2𝑟Δ. Thus tan 𝛼 = 𝑏/𝑟 ≤ 2Δ 𝑟 tan 𝛼 = 𝑏/𝑟 𝑏2 − 4Δ2 Numerical Accuracy First, let’s look at the extreme case: 2 tan 𝛼 Using tan 2𝛼 = 1−tan2 𝛼 We can obtain that 𝑟Δ ≤ 𝑏2 ≤ 2𝑟Δ. 2𝛼 Thus tan 𝛼 = 𝑏/𝑟 ≤ 2Δ 𝑟 This area is bounded by 1 2 2 sin 𝛼 ≤ 𝐿2 tan 𝛼 𝐿 sin 2𝛼 ≤ 𝐿 2 ≤ 𝐿2 2Δ 𝑟 . Where 𝐿 is the diagonal length of 𝑅𝑒𝑐. Bounded by 𝑏2 , thus bounded also by Numerical Accuracy Now, back to the general case: 𝑏 is the same as before (barely visible in this setting) Using geometry we obtain: sin( ∠𝑢𝑤𝑣) = Δ/( 2𝑟𝑑 + 𝑑 2 + b). • If 𝑑 ≤ Δ the point 𝑣 is located within a distance of 𝑑 + Δ ≤ 2Δ. Thus, the grey area is bounded as in the previous case. • If 𝑑 > Δ we have sin( ∠𝑢𝑤𝑣) < Δ/ 2𝑟𝑑 < Δ / 2𝑟Δ. Thus, the grey area is bounded by 𝐿2 Δ/r . Additive Approximation Thus, the leading term (we will see why next) of the accumulated error from the numerical integration, as Δ ⟶ 0 is 2 𝐶 − 𝐶 ≤ 𝑐𝑜𝑛𝑠𝑡 ⋅ |𝑅𝑒𝑐|𝑇𝐿 Δ 𝑟 Where 𝑇 = max {𝑓 𝑢 𝑓 𝑣 𝑔(𝑢, 𝑣)} 𝑢,𝑣∈𝑅𝑒𝑐 Additive Approximation Other error terms are linear in Δ, thus when Δ → 0 are negligible by the leading term which is with factor of Δ. Using our analysis the function 𝐶𝑜𝑚𝑝𝑢𝑡𝑒𝐺𝑟𝑖𝑑(𝑅𝑒𝑐, 𝑟, 𝜖) can be implemented by selecting Δ small enough such that the total error will be at most 𝜖. Additive Approximation – Running Time Denote the area of Rec by 𝐴. The algorithm is based on performing numerical integration over pairs of grid points (square-center points). The number of grid points in the rectangle is 𝐴/∆2 . Thus the running time is at most proportional to the number of pairs of grid points, which is 𝑂(𝐴2 /∆4 ). Additive Approximation – Running Time From our analysis we obtained 2 𝜖 = 𝑂(𝐿 𝐴𝑇 Δ + 𝑟 Δ𝑀𝐴2 ) It give that the total running time is: 𝐴2 𝐴10 𝐿16 𝑇 8 𝐴10 𝑇 4 𝑀4 𝑂 4 =𝑂 + 8 4 Δ 𝜖 𝑟 𝜖4 Additive Approximation As we saw, the running time of the EDCC algorithm is polynomial in all the parameters with 𝜖 − 𝑓𝑎𝑐𝑡𝑜𝑟 of 𝑂(𝜖 −8 ) Since in this analysis we depend on the maximum values of 𝑓 and 𝑔 over 𝑅𝑒𝑐 (parameter 𝑇) some will call it pseudo-polynomial. In “real-world” scenarios 𝑇 usually is not expected to be too high, but in “theory” we want to give an analysis which is independent in 𝑇. Multiplicative Approximation We now give a combined multiplicativeadditive analysis independent in 𝑇, such that we can then choose the grid constant Δ to guarantee that the result 𝐶 obtained by algorithm EDCC satisfies 1−𝜀 𝐶−𝜖 ≤𝐶 ≤ 1+𝜀 𝐶+𝜖 We modify the function 𝐶𝑜𝑚𝑝𝑢𝑡𝑒𝐺𝑟𝑖𝑑 to to be 𝐶𝑜𝑚𝑝𝑢𝑡𝑒𝐺𝑟𝑖𝑑(𝑅𝑒𝑐, 𝑟, 𝜖, 𝜀) Receives also the multiplicative accuracy parameter Multiplicative Approximation Probably no time for technical details for this analysis. Let’s jump a few slides straight to the running time. 𝑅′ 𝑅 • Denote by 𝑅 𝑥 the point on 𝑅 with coordinate 𝑥, where the 𝑥 − 𝑎𝑥𝑖𝑠 is taken to be the angle bisector between 𝑅′ and 𝑅. Similarly, 𝑅′ 𝑋 . • From our previous geometric results it can be obtained that for any point 𝑥 ∈ 𝑅𝑒𝑐, the euclidean distance 𝑅′ 𝑥 − 𝑅 𝑥 ≤ 𝑎 Δ where 𝐿2 𝑎 ≤ 𝑐𝑜𝑛𝑠𝑡 ⋅ 𝑟 𝑅′ For convenience, for a point 𝑢, denote 𝑓𝑢 (𝑣) = 𝑓(𝑢)𝑓(𝑣)𝑔(𝑢, 𝑣), and write it in Cartesian coordinates𝑓𝑢 (𝑥, 𝑦) w.r.t the axis described earlier. 𝑅 The TEC from 𝛽 − 𝑙𝑖𝑛𝑘𝑠 and 𝛾 − 𝑙𝑖𝑛𝑘𝑠 emanating from 𝑤 is bounded by 𝑅′ 𝑅 Thus, the difference between the TEC values of 𝛽 − 𝑙𝑖𝑛𝑘𝑠 and 𝛾 − 𝑙𝑖𝑛𝑘𝑠 emanating from 𝑢 to 𝛽 − 𝑙𝑖𝑛𝑘𝑠 and 𝛾 − 𝑙𝑖𝑛𝑘𝑠 emanating from 𝑤 is bounded by Now we work to represent it as a multiplicative of 𝑅′ 𝑅 Taking strips of length 𝑎 Δ we obtain the following inequality sequence Note also that Thus, when integrating over 𝐾𝑢 ∪ 𝐷 by summing 2𝑟 integrations on strips with length 𝑎 Δ, at least 𝑎 Δ such strips are needed. Note also that The difference in the TECs is bounded by the average of 2r the above monotone increasing sequence of length 𝑎 Δ (actually bounded by it’s first element, but we want to prove a factor). Note also that We have We have Multiplicative factor Additive term The leading term in the error as Δ → 0 is with multiplicative 𝑎 factor of 2𝑟 Δ and an additive term of 𝑎𝑀𝑟𝐿 Δ between the two TEC values. Other error terms are about the areas of inaccuracy we mentioned previously in the additive approximation. This error terms can be bounded using the same “strips” method but now strips of length at most Δ are sufficient. Obtaining additional error terms which are linear in Δ. As Δ → 0 they are negligible by the leading term. Multiplicative Approximation – Running Time For a 𝑅𝑒𝑐 of area 𝐴, we saw that the running time is at most proportional to the number of pairs of grid points which is 𝑂(𝐴2 /∆4 ). From our error analysis we obtain that 𝐿2 𝐴2 𝜀=𝑂 Δ 1.5 𝑟 𝜖 = 𝑂 𝑀 𝑟𝐴𝐿3 Δ From this, it is obtained that the total running time is 𝐴10 𝐿16 𝐴10 𝐿24 𝑀8 𝑂 + 8 12 𝜀 𝑟 𝜖 8𝑟4 The 𝜀 − 𝑓𝑎𝑐𝑡𝑜𝑟 and 𝜖 − 𝑓𝑎𝑐𝑡𝑜𝑟 on the running time is 𝑂 𝜀 −8 , 𝑂 𝜖 −8 . Find Sensitive Locations Scheme Using Algorithm EDCC one can approximate the TEC for an attack at any point, and in particular, find an approximated worst case attack (one with the highest TEC value). To achieve this goal, we divide 𝑅𝑒𝑐 into squares, forming a grid. Then, we execute EDCC algorithm from the previous section for every grid point (squares center-points) such that it is a center-point of a cut of radius 𝑟. This leads to a “network sensitivity map”, i.e., for every point we have an approximation of the damage by a possible attack in that point. Find Sensitive Locations Scheme To guarantee an attack location with TEC of at least 𝐶 − 𝜖 where 𝐶 is the 𝑇𝐸𝐶 of the actual worst cut and an additive accuracy parameter 𝜖 > 0, we provide the following algorithm: 1. For a cut of radius 𝑟, and accuracy parameter 𝜖 > 0, apply the function 𝑐𝑜𝑚𝑝𝑢𝑡𝑒𝐺𝑟𝑖𝑑(𝑅𝑒𝑐, 𝑟, 𝜖/2) to find ∆ > 0 such that the accuracy of Algorithm EDCC, given by Theorem 1 is 𝜖/2. Form a grid of constant ∆ (found in step 1) from 𝑅𝑒𝑐. For every grid point 𝑝, apply procedure 𝐸𝐷𝐶𝐶(𝑁, 𝑐𝑢𝑡(𝑝, 𝑟), 𝜖/2). The grid point with the highest calculated TEC is the center of the approximated worst cut. 2. Find Sensitive Locations Scheme Running-Time: For a 𝑅𝑒𝑐 with area 𝐴 The algorithm samples a circular cut of radius 𝑟 at the center point 𝑝 of each grid square. For each such cut, the algorithm executes 𝐸𝐷𝐶𝐶 𝑁, 𝑐𝑢𝑡 𝑝, 𝑟 time. The grid has 𝑂 𝐴 ∆2 𝜖 , 2 in 𝑂 𝐴2 Δ4 points. Thus, in total it runs in 𝑂(𝐴3 /Δ6 ). Since 𝜖 is of order Δ we obtain that the 𝜖 − 𝑓𝑎𝑐𝑡𝑜𝑟 on the running time is 𝑂 𝜖 −12 . Similar result can be obtained for a combined 𝜀-multiplicative 𝜖-additive approximation using the modified EDCC algorithm. Find Sensitive Locations Scheme Random Disasters: Using the methods we showed, we can also compute the approximated expected TEC by a random disaster on the random network. For example, for the uniform case by returning 1 𝑅𝑒𝑐 𝑝∈𝐺𝑟𝑖𝑑 𝐸𝐷𝐶𝐶( 𝑁, 𝑐𝑢𝑡 𝑝, 𝑟 , 𝜖/2) The randomly located failure can model a natural disaster such as a hurricane or collateral (non-targeted) damage in an EMP attack. Simulations, Numerical Results. In order to test our algorithms, we estimate the expected impact of circular cuts on communication networks in the USA based on a population density map. Data of the population density of the USA was taken as the intensity function 𝑓(𝑢). The population density matrix used give a resolution of approximately 27km. This gave a matrix of dimensions 104×236. The algorithm was then run over this intensity function. Simulations, Numerical Results. Color map of the the USA population density in logarithmic scale. The The values determines the intensity function used as the input for the simulation Simulations, Numerical Results. The function 𝜔(𝑢, 𝑣) was taken to be 1/𝑑𝑖𝑠𝑡(𝑢, 𝑣) and 1/𝑑𝑖𝑠𝑡 2 (𝑢, 𝑣), where 𝑑𝑖𝑠𝑡 is the Euclidean distance between the points. Based on observations that the lengths of physical Internet connections follow this distribution. The capacity probability function ℎ was taken to be constant, independent of the distance, reflecting an assumption of standard equipment. Each run took around 24 hours on a standard Intel CPU computer. Simulations, Numerical Results. Color map of the centers of circular cuts with radius r = 5 (approximately 130km). Red is most harmful. Simulations, Numerical Results. Color map of the centers of circular cuts with radius r = 5 (approximately 208km). Red is most harmful. Simulations, Numerical Results. Results for 𝜔 𝑢, 𝑣 = 1 𝑑𝑖𝑠𝑡 2 𝑢,𝑣 (instead 1 𝑑𝑖𝑠𝑡 𝑢,𝑣 ) Color map of the centers of circular cuts with radius r = 5 (approximately 130km). Red is most harmful. Simulations, Numerical Results. Results for 𝜔 𝑢, 𝑣 = 1 𝑑𝑖𝑠𝑡 2 𝑢,𝑣 (instead 1 𝑑𝑖𝑠𝑡 𝑢,𝑣 ) Color map of the centers of circular cuts with radius r = 10 (approximately 260km). Red is most harmful. Simulations, Numerical Results. Previous work on deterministic network line cuts simulations. Line segments cuts of length approximately 120 miles optimizing TEC – the red cuts maximize TEC and the black lines are nearly worst-case cuts. Simulations, Numerical Results. Our results imply that some information on the network sensitivity and vulnerabilities can be deduced from the population alone, with no information on any physical links and nodes. However, our algorithm can be used in conjunction with more complicated modeling assumptions, including topographic features and economic considerations to give more accurate results. Conclusions, Summary Our schemes allows to examine how valuable is public information (such as demography, topography and economic considerations) to an attacker’s destruction assessment capabilities, and examine the affect of hiding the actual physical location of the fibers on the attack strategy. Thereby, the schemes can be used as a tool for policy makers and engineers to design more robust networks by placing links along paths that avoid areas of high damage cuts, or identifying locations which require additional protection efforts (e.g., equipment shielding). Conclusions, Summary Recent contributions to this emerging field of geographical failures focused on deterministic networks, studied various failure models. We described polynomial time approximation algorithms for finding the damage caused by cuts at different points in our spatial random network model and to approximate the location and damage of the worst case cuts. To the best of our knowledge this work is the first to study such geographical failures in the context of spatial random networks. Future work The discussion about finding vulnerable geographic locations to physical attacks naturally leads to the question of robust network design in the face of geographical failures. Several questions are proposed: Designing the network’s physical topology under some demand constraints (e.g., nodes that should be located within a specific region, capacity and flow demands) such that the damage by a large-scale physical attack is minimized. Study the effect of adding minimal infrastructure (e.g., lighting-up dark fibers) on network resilience, and determine how to use low-cost shielding for existing components to mitigate large-scale physical attacks.