Network Strengthening Against Malicious Attacks
Robustness measures the toleration of complex networks against random failures and malicious attacks. A malicious attack removes the most important node iteratively and destroys the network quickly. It is crucial to strengthen the network robustness against malicious attacks. In this paper, we propose an algorithm to strengthen the robustness with reduced change of network structure compared to state-of-the-art algorithms. The algorithm is called targeted variable neighborhood search (TVNS) algorithm. Experiments on real-world and random networks show that TVNS is efficient on strengthening the robustness against malicious attacks. The strengthened network against high degree adaptive attack shows an onion-like structure where nodes prefer to connect with similar degree nodes; while for the strengthened network against high betweenness adaptive attack, nodes prefer to connect with similar betweenness nodes.
KeywordsNetwork robustness Malicious attacks TVNS algorithm
This study is supported by the National Natural Science Foundation of China (Grants No. 61861136005 and No. 61851110763).
- 4.Souto, P.C., Teixeira, A.S., Francisco, A.P., Santos, F.C.: Capturing financial volatility through simple network measures. In: International Conference on Complex Networks and their Applications, pp. 534–546. Springer (2018)Google Scholar
- 5.Sarker, B., Rtichie, D.W., Aridhi, S.: Exploiting complex protein domain networks for protein function annotation. In: International Conference on Complex Networks and their Applications, pp. 598–610. Springer (2018)Google Scholar
- 12.Pizzuti, C., Socievole, A.: A genetic algorithm for enhancing the robustness of complex networks through link protection. In: International Conference on Complex Networks and their Applications, pp. 807–819. Springer (2018)Google Scholar
- 14.Louzada, V.H.P., Daolio, F., Herrmann, H.J., Tomassini, M.: Generating robust and efficient networks under targeted attacks. In: Propagation Phenomena in Real World Networks, pp. 215–224. Springer (2015)Google Scholar