Topology of Covert Conflict

From P2P Foundation
Jump to navigation Jump to search

This article cuts to the core of the battle between hierarchy and rhizome [1]

URL = http://www.cl.cam.ac.uk/TechReports/UCAM-CL-TR-637.pdf

Article: Shishir Nagaraja and Ross Anderson:The Topology of Covert Conflict.

Introduction

Jeff Vail:

"Shishir Nagaraja and Ross Anderson of Cambridge published a fascinating article entitled “The Topology of Covert Conflict.” This article cuts to the core of the battle between hierarchy and rhizome, and while it is was conceived as a way to address the effective disruption of de-centralized networks such as al-Qa’ida and file-sharing systems, it provides a profound theoretical basis for the defense of a society founded upon the principles of rhizome." (http://www.jeffvail.net/2006/04/rhizome-network-defense-strategies.html)


Abstract

“Often an attacker tries to disconnect a network by destroying nodes or edges, while the defender counters using various resilience mechanisms. Examples include a music industry body attempting to close down a peer-to-peer file-sharing network; medics attempting to halt the spread of an infectious disease by selective vaccination; and a police agency trying to decapitate a terrorist organisation. Albert, Jeong and Barab´asi famously analysed the static case, and showed that vertex-order attacks are effective against scale-free networks. We extend this work to the dynamic case by developing a framework based on evolutionary game theory to explore the interaction of attack and defence strategies. We show, first, that naive defences don’t work against vertex-order attack; second, that defences based on simple redundancy don’t work much better, but that defences based on cliques work well…Our models thus build a bridge between network analysis and evolutionary game theory, and provide a framework for analysing defence and attack in networks where topology matters. They suggest definitions of efficiency of attack and defence, and may even explain the evolution of insurgent organisations from networks of cells to a more virtual leadership that facilitates operations rather than directing them.”


Commentary

Jeff Vail:

"the final conclusion of this Cambridge team is, to use my terminology, that the devolution of quasi-hierarchal networks into a closer approximation of a rhizome structure is the best defense against predation by a hierarchal opponent.

Taking a bit closer look, what is the optimal connectivity structure for rhizome? In theory, a pure rhizome structure would have no higher-order vertexes for attack. However, there is the potential that if every node maintains the same connectivity, communications will either be so burdensome (every node has many, many connections), or too slow (every node has very few connections). The most efficient linking methodology that still maintains a uniformly low vertex-order among nodes is the “small-worlds” theory: most links connect to very “close” neighbors, but at least one or two are very distant and weak. These distant, weak links are what makes the “6-degrees of separation” effect possible. How is someone in Southern California really linked to a poor peasant in rural India by less than 6 links? It’s not the close ties to neighbors and coworkers (probably), but rather it’s that weak connection—the foreign exchange student that the Californian knew in high school from New Delhi. These weak and distant connections are what dramatically improve communications and information processing efficiency within a relatively “flat” network architecture. From the perspective of rhizome defending itself against attacks of hierarchy, this structure is also the most effective because it eliminates the most effective hierarchal tactic of vertex-order decapitation." (http://www.jeffvail.net/2006/04/rhizome-network-defense-strategies.html)