Skip to main content

Identifying Vulnerable Nodes to Cascading Failures: Optimization-Based Approach

  • Conference paper
  • First Online:
  • 3128 Accesses

Part of the book series: Studies in Computational Intelligence ((SCI,volume 881))

Abstract

A key challenge to ensuring robustness of complex systems is to correctly identify component systems, which we simply call nodes, that are more likely to trigger cascading failures. A recent approach takes advantage of the relationship between the cascading failure probability and the non-backtracking centrality of nodes when the Perron-Frobenius (P-F) eigenvalue of the associated non-backtracking matrix is close to one. However, this assumption is not guaranteed to hold in practice. Motivated by this observation, we propose a new approach that does not require the P-F eigenvalue to be close to one, and demonstrate that it offers good accuracy and outperforms the non-backtracking centrality-based approach for both synthetic and real networks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Stanford Large Network Dataset Collection. http://snap.stanford.edu/data/

  2. Albert, R., Jeong, H., Barabasi, A.L.: Error and attack tolerance of complex networks. Nature 406, 378–382 (2000)

    Article  Google Scholar 

  3. Bollobas, B., Riordan, O.: The diameter of a scale-free random graph. Combinatorica 24(1), 5–34 (2004)

    Article  MathSciNet  Google Scholar 

  4. Boyd, S., Vandenberghe, L.: Convex Optimization. Cambridge University Press, Cambridge (2004)

    Book  Google Scholar 

  5. Horn, R.A., Johnson, C.R.: Topics in Matrix Analysis. Cambridge University Press, Cambridge (1994)

    MATH  Google Scholar 

  6. La, R.J.: Identifying vulnerable nodes to cascading failures: centrality to the rescue. In: Proceedings of the 7th International Conference on Complex Networks and Their Applications (2018)

    Google Scholar 

  7. La, R.J.: Influence of clustering on cascading failures in interdependent systems. IEEE Trans. Netw. Sci. Eng. 6(3), 351–363 (2019)

    Article  Google Scholar 

  8. Martin, T., Zhang, X., Newman, M.E.J.: Localization and centrality in networks. Phys. Rev. E 90(5), 052808 (2014)

    Article  Google Scholar 

  9. Molloy, M., Reed, B.: A critical point for random graphs with a given degree sequence. Random Struct. Algorithms 6(2–3), 161–180 (1995)

    Article  MathSciNet  Google Scholar 

  10. Molloy, M., Reed, B.: The size of the largest component of a random graph on a fixed degree sequence. Comb. Probab. Comput. 7(3), 295–305 (1998)

    Article  Google Scholar 

  11. Newman, M.E.J.: Assortative mixing in networks. Phys. Rev. Lett. 89(20), 208701 (2002)

    Article  Google Scholar 

  12. Newman, M.E.J.: Mixing patterns in networks. Phys. Rev. E 67(2), 026126 (2003)

    Article  MathSciNet  Google Scholar 

  13. Newman, M.E.J.: The structure and function of complex networks. SIAM Rev. 45(2), 167–256 (2003)

    Article  MathSciNet  Google Scholar 

  14. Yang, Y., Nishikawa, T., Motter, A.E.: Small vulnerable sets determine large network cascades in power grids. Science 358(6365), eaan3184 (2017)

    Article  Google Scholar 

Download references

Acknowledgment

This work was supported in part by contract 70NANB16H024 from National Institute of Standards and Technology (NIST).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Richard J. La .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

La, R.J. (2020). Identifying Vulnerable Nodes to Cascading Failures: Optimization-Based Approach. In: Cherifi, H., Gaito, S., Mendes, J., Moro, E., Rocha, L. (eds) Complex Networks and Their Applications VIII. COMPLEX NETWORKS 2019. Studies in Computational Intelligence, vol 881. Springer, Cham. https://doi.org/10.1007/978-3-030-36687-2_64

Download citation

Publish with us

Policies and ethics