ABSTRACT

The information security model is composed of confiden-

tiality, integrity, and availability. Availability is the area of

information security that requires services and network

components to be continuously available for the user com-

munity. If a service or component is unavailable, confiden-

tiality and integrity are meaningless. Network availability

is the underlying component that must be present in order

for services to be accessible for end users. Developers have

used redundancy to assist in ensuring that an application or

network is available; however, this is an expensive solution

if several network components and services are involved.

Computer networks, the electrical power grid, the protein

network of a cell, and many other scale-free networks have

inherent problems. In order to understand the problems that

reside within scale-free networks, an understanding of the

concept of scale-free network construction must be

observed. Discovered by the research performed by

Baraba´si and his team,[1] scale-free networks are first

identified by the characteristic of power laws. By examin-

ing a power law histogram (Fig. 1), the components of the

power law follow a downward decline, indicating the pre-

sence of many small nodes and a few large nodes.